General
-
Target
753683bb8780335d2d20c6d6ff50f81983fb38e62184e23a1bfa161fa10f580a
-
Size
1020KB
-
Sample
230523-jzdtfafc7t
-
MD5
eb0ef354ca061d8f24374a596236c29a
-
SHA1
5d9b9be52b4daded140f51cd195e287328e897ce
-
SHA256
753683bb8780335d2d20c6d6ff50f81983fb38e62184e23a1bfa161fa10f580a
-
SHA512
a7a67284f69836980196787ed9660807ed81d9986215309d625a39a1f537de6e1c2df73c4761888a9b7903526382c1169dd329268cc65f3cb1fd751127956ba7
-
SSDEEP
24576:qylBXgF1/7NvNv67l/XNPP1Yz8GcSH6TPdDaT:xlrlFdaST5a
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
753683bb8780335d2d20c6d6ff50f81983fb38e62184e23a1bfa161fa10f580a
-
Size
1020KB
-
MD5
eb0ef354ca061d8f24374a596236c29a
-
SHA1
5d9b9be52b4daded140f51cd195e287328e897ce
-
SHA256
753683bb8780335d2d20c6d6ff50f81983fb38e62184e23a1bfa161fa10f580a
-
SHA512
a7a67284f69836980196787ed9660807ed81d9986215309d625a39a1f537de6e1c2df73c4761888a9b7903526382c1169dd329268cc65f3cb1fd751127956ba7
-
SSDEEP
24576:qylBXgF1/7NvNv67l/XNPP1Yz8GcSH6TPdDaT:xlrlFdaST5a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-