General
-
Target
eab72aebe9233b3e2d89db1334049498.exe
-
Size
1019KB
-
Sample
230523-jwjkhsfc6v
-
MD5
eab72aebe9233b3e2d89db1334049498
-
SHA1
f3fa2d0341613c56b03de0d539c5df91158d3df9
-
SHA256
e5c05601ed33b83798178c9055d40cde7fd8edae53766938eb5c6d47f0b17c34
-
SHA512
ed1dd945fad6a2b6748541bcb3f5b287c6ff307e0e1dad2ccef081cbb79d2eb9cc2c1805944d531b8df4b56f28ca490580821b56165ae738e5f9915abcb551fc
-
SSDEEP
12288:mMr6y90sb+Q3BT70Dk0NgYxsrZvIH9/NjLFWHWEYofXaPbWJe20KggsvjnbNssUt:MyzX4DNpxs9vk/tGziSJ3Yjnb6k+gwz
Static task
static1
Behavioral task
behavioral1
Sample
eab72aebe9233b3e2d89db1334049498.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
eab72aebe9233b3e2d89db1334049498.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
eab72aebe9233b3e2d89db1334049498.exe
-
Size
1019KB
-
MD5
eab72aebe9233b3e2d89db1334049498
-
SHA1
f3fa2d0341613c56b03de0d539c5df91158d3df9
-
SHA256
e5c05601ed33b83798178c9055d40cde7fd8edae53766938eb5c6d47f0b17c34
-
SHA512
ed1dd945fad6a2b6748541bcb3f5b287c6ff307e0e1dad2ccef081cbb79d2eb9cc2c1805944d531b8df4b56f28ca490580821b56165ae738e5f9915abcb551fc
-
SSDEEP
12288:mMr6y90sb+Q3BT70Dk0NgYxsrZvIH9/NjLFWHWEYofXaPbWJe20KggsvjnbNssUt:MyzX4DNpxs9vk/tGziSJ3Yjnb6k+gwz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-