General
-
Target
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b
-
Size
1020KB
-
Sample
230523-smt5bsgg2x
-
MD5
5aa0a1282685cfc454548ebcac7e6ad3
-
SHA1
0961921632cef969c4b6e61a92c03504a8ed6187
-
SHA256
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b
-
SHA512
69d919d3eb04fb4fcb3cf0b3b427b2e179bfd93470fb536aaf2c90477d43a883f41ba45c649718ff3e54c3ffe77cbeb620d20c280c7b70d49653e338fd9ff759
-
SSDEEP
24576:VyPSDYAQACyoxJvEU2Sk2Liw/NpUy8QHy8unDh+kyhUa:wPeYYoYQL/MyZHfuDw
Static task
static1
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b
-
Size
1020KB
-
MD5
5aa0a1282685cfc454548ebcac7e6ad3
-
SHA1
0961921632cef969c4b6e61a92c03504a8ed6187
-
SHA256
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b
-
SHA512
69d919d3eb04fb4fcb3cf0b3b427b2e179bfd93470fb536aaf2c90477d43a883f41ba45c649718ff3e54c3ffe77cbeb620d20c280c7b70d49653e338fd9ff759
-
SSDEEP
24576:VyPSDYAQACyoxJvEU2Sk2Liw/NpUy8QHy8unDh+kyhUa:wPeYYoYQL/MyZHfuDw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-