General
-
Target
fc0889a59ff8089c74d0030610fe6126e7abb061d7ea2b96a7d954d674b64882
-
Size
564KB
-
Sample
230815-sr6c6abd59
-
MD5
03d4b26cd9cb0efccb1374d61a1ada55
-
SHA1
71c0dea9c3f8f5b3e48eabf09a4f0df6fb4af909
-
SHA256
fc0889a59ff8089c74d0030610fe6126e7abb061d7ea2b96a7d954d674b64882
-
SHA512
101f4aa87652416a1ba0c6b7c06c7bef051bead534a28ad76c935ecce6640915db28b5df68399a47d1611f63a940fe52198c098574bfdfed2f7b0d84ea59c6e4
-
SSDEEP
12288:OMrxy90+s5/U7ErRUq1qXxaH/BHxE3pp9J:PyU5/dr9f5Hyv3
Static task
static1
Behavioral task
behavioral1
Sample
fc0889a59ff8089c74d0030610fe6126e7abb061d7ea2b96a7d954d674b64882.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
meson
77.91.124.54:19071
-
auth_value
47ca57ebe5c142c9ad4650f71bf57877
Targets
-
-
Target
fc0889a59ff8089c74d0030610fe6126e7abb061d7ea2b96a7d954d674b64882
-
Size
564KB
-
MD5
03d4b26cd9cb0efccb1374d61a1ada55
-
SHA1
71c0dea9c3f8f5b3e48eabf09a4f0df6fb4af909
-
SHA256
fc0889a59ff8089c74d0030610fe6126e7abb061d7ea2b96a7d954d674b64882
-
SHA512
101f4aa87652416a1ba0c6b7c06c7bef051bead534a28ad76c935ecce6640915db28b5df68399a47d1611f63a940fe52198c098574bfdfed2f7b0d84ea59c6e4
-
SSDEEP
12288:OMrxy90+s5/U7ErRUq1qXxaH/BHxE3pp9J:PyU5/dr9f5Hyv3
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1