General
-
Target
ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9
-
Size
1021KB
-
Sample
230523-kgg9ksfd6w
-
MD5
29fa5065e32794c09250f0e66c49a7ec
-
SHA1
44734fce843620fa914d196b4977723197a70bd2
-
SHA256
ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9
-
SHA512
e9e6f79d4d063378504515e2d924271bff170f94a03bd25e22eb659a85e4a84af69f38dcd3e6e9600e6f35f962c8e814b346328dbb876d9957f14d32592e3775
-
SSDEEP
24576:2yZ3tNig+LAJvUvrqFNsYAPNlK/j/zVaNhNREyy:FZ9+LTvrEyYelK7zENe
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9
-
Size
1021KB
-
MD5
29fa5065e32794c09250f0e66c49a7ec
-
SHA1
44734fce843620fa914d196b4977723197a70bd2
-
SHA256
ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9
-
SHA512
e9e6f79d4d063378504515e2d924271bff170f94a03bd25e22eb659a85e4a84af69f38dcd3e6e9600e6f35f962c8e814b346328dbb876d9957f14d32592e3775
-
SSDEEP
24576:2yZ3tNig+LAJvUvrqFNsYAPNlK/j/zVaNhNREyy:FZ9+LTvrEyYelK7zENe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-