General
-
Target
8b75b8f089898a1588e6bf7f6b894948.exe
-
Size
1020KB
-
Sample
230523-vcsvmagc39
-
MD5
8b75b8f089898a1588e6bf7f6b894948
-
SHA1
3fe9530527dd2d5bbccbab7357b2e864a9482b1e
-
SHA256
80183f3b8dd0d9dc72332caa0edd4a766f3ee1df7c9905c2adb9a1230ccf1d24
-
SHA512
6607b1d3e755c309b1ef2f23f015788ec9d9d481f5afd504b7db4911b06e9184157b55f329324e88dbd7a7b72f79196cc9ecb7475fd5fecf7d9f3f0c1bb01452
-
SSDEEP
24576:3yOvX77dOxctKvUG4qX2238TUp3OhCf8njU4+Jnp+Y2R:C2hO6bhTUp+hk0jUHnV
Static task
static1
Behavioral task
behavioral1
Sample
8b75b8f089898a1588e6bf7f6b894948.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8b75b8f089898a1588e6bf7f6b894948.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
8b75b8f089898a1588e6bf7f6b894948.exe
-
Size
1020KB
-
MD5
8b75b8f089898a1588e6bf7f6b894948
-
SHA1
3fe9530527dd2d5bbccbab7357b2e864a9482b1e
-
SHA256
80183f3b8dd0d9dc72332caa0edd4a766f3ee1df7c9905c2adb9a1230ccf1d24
-
SHA512
6607b1d3e755c309b1ef2f23f015788ec9d9d481f5afd504b7db4911b06e9184157b55f329324e88dbd7a7b72f79196cc9ecb7475fd5fecf7d9f3f0c1bb01452
-
SSDEEP
24576:3yOvX77dOxctKvUG4qX2238TUp3OhCf8njU4+Jnp+Y2R:C2hO6bhTUp+hk0jUHnV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-