General
-
Target
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19
-
Size
389KB
-
Sample
230721-kvxanadd33
-
MD5
becabbca0941778fb8f52ebcf672ad0a
-
SHA1
da72cfa309e64af3faac23d8a7896fd5d1ad8244
-
SHA256
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19
-
SHA512
b15d5e51c2e4042114d1a9fa04457d67bf9c5cea5dd7fabef7c0b1ce79fc9ad802b40b452e93acf5698478be5db988d8aac62192a12d76a7e5ccb5375595c547
-
SSDEEP
6144:Koy+bnr+xp0yN90QENkSoTkaWu5VEzkW2PZNwGepXZpTBy15SlObUhqb96NLrx3:IMrpy902j5V0pbtyTawb9E3
Static task
static1
Behavioral task
behavioral1
Sample
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Targets
-
-
Target
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19
-
Size
389KB
-
MD5
becabbca0941778fb8f52ebcf672ad0a
-
SHA1
da72cfa309e64af3faac23d8a7896fd5d1ad8244
-
SHA256
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19
-
SHA512
b15d5e51c2e4042114d1a9fa04457d67bf9c5cea5dd7fabef7c0b1ce79fc9ad802b40b452e93acf5698478be5db988d8aac62192a12d76a7e5ccb5375595c547
-
SSDEEP
6144:Koy+bnr+xp0yN90QENkSoTkaWu5VEzkW2PZNwGepXZpTBy15SlObUhqb96NLrx3:IMrpy902j5V0pbtyTawb9E3
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1