General
-
Target
41e4b9437169c5e98d7c28a3b93bc783ab0dfb7bebf15ece2ee365c76b78294d
-
Size
563KB
-
Sample
230815-lcnfgaaa54
-
MD5
37b944fa25deb13bb5625c2251b29ddd
-
SHA1
ef19bb494666ba4c6c88adb324fa99f824ca708d
-
SHA256
41e4b9437169c5e98d7c28a3b93bc783ab0dfb7bebf15ece2ee365c76b78294d
-
SHA512
0f14a3a39b84787be8f74d4cfc6c496662b92f2c1a4b14dd2d8356c480aba478c207c0510e914f7e90d10aa3cd00b98ae726ff4e2abe7fa0875e907fc4d4b7d7
-
SSDEEP
12288:/MrFy90VpJOYD/y5cgE/IabHX7OELpS68Gtyii:2ykJOYLYaTSQbt2
Static task
static1
Behavioral task
behavioral1
Sample
41e4b9437169c5e98d7c28a3b93bc783ab0dfb7bebf15ece2ee365c76b78294d.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
meson
77.91.124.54:19071
-
auth_value
47ca57ebe5c142c9ad4650f71bf57877
Targets
-
-
Target
41e4b9437169c5e98d7c28a3b93bc783ab0dfb7bebf15ece2ee365c76b78294d
-
Size
563KB
-
MD5
37b944fa25deb13bb5625c2251b29ddd
-
SHA1
ef19bb494666ba4c6c88adb324fa99f824ca708d
-
SHA256
41e4b9437169c5e98d7c28a3b93bc783ab0dfb7bebf15ece2ee365c76b78294d
-
SHA512
0f14a3a39b84787be8f74d4cfc6c496662b92f2c1a4b14dd2d8356c480aba478c207c0510e914f7e90d10aa3cd00b98ae726ff4e2abe7fa0875e907fc4d4b7d7
-
SSDEEP
12288:/MrFy90VpJOYD/y5cgE/IabHX7OELpS68Gtyii:2ykJOYLYaTSQbt2
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1