General
-
Target
5ae3c2d5310190080dc56f854672ecbc2fea82cc757a3201ffdfa66151231e61
-
Size
389KB
-
Sample
230721-nyh4zsfa7t
-
MD5
924e6b4320092887da48366ee373f28c
-
SHA1
37ca7e6f7457a6616e26c5e753431f708674bbf2
-
SHA256
5ae3c2d5310190080dc56f854672ecbc2fea82cc757a3201ffdfa66151231e61
-
SHA512
a8f6a7bdd68758c7fad4c2ba3a240763757506413e551d2a768880b62614e47ee56fb900e5b814d6abbfe8e3e89ab66521b7aa112741baa124255f99519e91fb
-
SSDEEP
6144:Kyy+bnr+Ep0yN90QEFfuQlkW8PZNUM7zGZd/u99WQ+TY2zbKseashXH5S2EGIOI:eMrUy90XKCZBHQ+TYnLHM6DI
Static task
static1
Behavioral task
behavioral1
Sample
5ae3c2d5310190080dc56f854672ecbc2fea82cc757a3201ffdfa66151231e61.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Targets
-
-
Target
5ae3c2d5310190080dc56f854672ecbc2fea82cc757a3201ffdfa66151231e61
-
Size
389KB
-
MD5
924e6b4320092887da48366ee373f28c
-
SHA1
37ca7e6f7457a6616e26c5e753431f708674bbf2
-
SHA256
5ae3c2d5310190080dc56f854672ecbc2fea82cc757a3201ffdfa66151231e61
-
SHA512
a8f6a7bdd68758c7fad4c2ba3a240763757506413e551d2a768880b62614e47ee56fb900e5b814d6abbfe8e3e89ab66521b7aa112741baa124255f99519e91fb
-
SSDEEP
6144:Kyy+bnr+Ep0yN90QEFfuQlkW8PZNUM7zGZd/u99WQ+TY2zbKseashXH5S2EGIOI:eMrUy90XKCZBHQ+TYnLHM6DI
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1