General
-
Target
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675
-
Size
388KB
-
Sample
230721-t19ydafh4s
-
MD5
dc02f4846020e43ca21d8c5a48f43503
-
SHA1
387a16e086b8d3268af79d736360723dbe3ff8ee
-
SHA256
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675
-
SHA512
d5deb7d4daf5f4fb2f7deae0705c380a54198f10e22590e772c3bfe98e27d9139a95e380c1e8fc0440df79414055546a1243b8ba757026377a661932d6948ca5
-
SSDEEP
6144:Kby+bnr+rp0yN90QEOnXIxi4+YQDAfpjahkQjHidvz2d9RctdQD7Xe:JMrHy90UXShzQD1kEH0vidfctdA7u
Static task
static1
Behavioral task
behavioral1
Sample
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Targets
-
-
Target
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675
-
Size
388KB
-
MD5
dc02f4846020e43ca21d8c5a48f43503
-
SHA1
387a16e086b8d3268af79d736360723dbe3ff8ee
-
SHA256
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675
-
SHA512
d5deb7d4daf5f4fb2f7deae0705c380a54198f10e22590e772c3bfe98e27d9139a95e380c1e8fc0440df79414055546a1243b8ba757026377a661932d6948ca5
-
SSDEEP
6144:Kby+bnr+rp0yN90QEOnXIxi4+YQDAfpjahkQjHidvz2d9RctdQD7Xe:JMrHy90UXShzQD1kEH0vidfctdA7u
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1