General
-
Target
fd3a6a5eeb718fb118a01f75f33b71a69d388e612a05eb24208126377129a9bf
-
Size
1020KB
-
Sample
230523-ts598aha3w
-
MD5
e9e07e7c2519ec45f5e7668cafb9a0bf
-
SHA1
8b7e753d98045ae544139ef2e5640006fdde6de6
-
SHA256
fd3a6a5eeb718fb118a01f75f33b71a69d388e612a05eb24208126377129a9bf
-
SHA512
e2f50ac10a7ff02b384b46247b6a5da015e06a8e0646fdc87305efc104fc9dc501185211de837f4b406e8cafc1afbc3c2d40a15b2fa506140d5ec34d66f32708
-
SSDEEP
24576:hyDwcvxoRt6ZWjqfv7w1VWd1MKHO68UJWudx3jvq9yA:UvvKtj5VPKHO6BJ93W9
Static task
static1
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
fd3a6a5eeb718fb118a01f75f33b71a69d388e612a05eb24208126377129a9bf
-
Size
1020KB
-
MD5
e9e07e7c2519ec45f5e7668cafb9a0bf
-
SHA1
8b7e753d98045ae544139ef2e5640006fdde6de6
-
SHA256
fd3a6a5eeb718fb118a01f75f33b71a69d388e612a05eb24208126377129a9bf
-
SHA512
e2f50ac10a7ff02b384b46247b6a5da015e06a8e0646fdc87305efc104fc9dc501185211de837f4b406e8cafc1afbc3c2d40a15b2fa506140d5ec34d66f32708
-
SSDEEP
24576:hyDwcvxoRt6ZWjqfv7w1VWd1MKHO68UJWudx3jvq9yA:UvvKtj5VPKHO6BJ93W9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-