General
-
Target
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49
-
Size
388KB
-
Sample
230810-a7dnzaab7y
-
MD5
9aa7f97df38d59107c4d0de7a283f9bb
-
SHA1
8a027943608aa2d758451da41e87a4d04c998710
-
SHA256
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49
-
SHA512
86f51b56f2bd9ff0ef0a65bd78a2ffaaca596095190295d94753dde21a6e4a978d60dea84023dd087803075be4df4fe960d3889fee39d0487927afe7b64302c2
-
SSDEEP
6144:KFy+bnr+1p0yN90QEdbncoa2l3bcpXRrtR5HhJ1LabSBqZjiwdCMKU72N6qNJi:bMrVy90fnTa22pzhL2sQdXKr/N0
Static task
static1
Behavioral task
behavioral1
Sample
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Targets
-
-
Target
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49
-
Size
388KB
-
MD5
9aa7f97df38d59107c4d0de7a283f9bb
-
SHA1
8a027943608aa2d758451da41e87a4d04c998710
-
SHA256
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49
-
SHA512
86f51b56f2bd9ff0ef0a65bd78a2ffaaca596095190295d94753dde21a6e4a978d60dea84023dd087803075be4df4fe960d3889fee39d0487927afe7b64302c2
-
SSDEEP
6144:KFy+bnr+1p0yN90QEdbncoa2l3bcpXRrtR5HhJ1LabSBqZjiwdCMKU72N6qNJi:bMrVy90fnTa22pzhL2sQdXKr/N0
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1