General
-
Target
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3
-
Size
1020KB
-
Sample
230523-tm918agh9x
-
MD5
4646cc639134afda050003e7f05c5377
-
SHA1
b49ac1579df9c95343f8b00e2a70cf22d0ff5318
-
SHA256
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3
-
SHA512
7ce656ef8e2f77dcd163bfca39bb9f576281e13d582292f510edc33a7cfccda209336c2e8259627347b85c6c705427f2bf4593d7bac7ba869bae2aa68fa72339
-
SSDEEP
24576:+y6XZgtwmbnplSvySoJ2ntlcCcXSzxpIQrrkac3q2A+:N6XGymzpvSoJ2nTcCrxlll
Static task
static1
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3
-
Size
1020KB
-
MD5
4646cc639134afda050003e7f05c5377
-
SHA1
b49ac1579df9c95343f8b00e2a70cf22d0ff5318
-
SHA256
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3
-
SHA512
7ce656ef8e2f77dcd163bfca39bb9f576281e13d582292f510edc33a7cfccda209336c2e8259627347b85c6c705427f2bf4593d7bac7ba869bae2aa68fa72339
-
SSDEEP
24576:+y6XZgtwmbnplSvySoJ2ntlcCcXSzxpIQrrkac3q2A+:N6XGymzpvSoJ2nTcCrxlll
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-