General
-
Target
file.exe
-
Size
1020KB
-
Sample
230524-bkhj3sah8s
-
MD5
47c9fad851d822398e63211fd7407f71
-
SHA1
ea5154a47be879d569c966d217db9f6bc2eabe19
-
SHA256
7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c
-
SHA512
dc7de56bf0534a764600dc010775b6cf1daed3aa4ab35e7375f9fddf0af9590f94df8cd2b1d47dee0b9affca7c179ef9581d0d6e4ead098c111f51a75eb354ab
-
SSDEEP
24576:4yMVtu0XQyC6Ey1vL+k+lwA6ivn2XGH8A1pn7Y:/MVPQy5E2+Hwov
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
file.exe
-
Size
1020KB
-
MD5
47c9fad851d822398e63211fd7407f71
-
SHA1
ea5154a47be879d569c966d217db9f6bc2eabe19
-
SHA256
7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c
-
SHA512
dc7de56bf0534a764600dc010775b6cf1daed3aa4ab35e7375f9fddf0af9590f94df8cd2b1d47dee0b9affca7c179ef9581d0d6e4ead098c111f51a75eb354ab
-
SSDEEP
24576:4yMVtu0XQyC6Ey1vL+k+lwA6ivn2XGH8A1pn7Y:/MVPQy5E2+Hwov
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-