General
-
Target
db4ede1b9360f8892a7b938d7df6bb04903eaebac1a2cc8c4698379e7e674e8b
-
Size
564KB
-
Sample
230816-ekdsnsha4x
-
MD5
a98472547c0fe8d8d1f8721afbe9bc88
-
SHA1
7964e9df148f64ccb32274f60d0e2cf1d97914a6
-
SHA256
db4ede1b9360f8892a7b938d7df6bb04903eaebac1a2cc8c4698379e7e674e8b
-
SHA512
3d18c88143862841691a30d4bc926a041443deaa338508d914beafb67581a2b05fd812e1df9a40c35788af8388935e1ad415d46aed5bad706b803b0e4fbf7cec
-
SSDEEP
12288:+MrLy90az97YCpSr8deA7nJHS7AYe2Mfr1VeGJ/jyN2BgfxAS:9yz97YCQr8e8HzY7010GHBiAS
Static task
static1
Behavioral task
behavioral1
Sample
db4ede1b9360f8892a7b938d7df6bb04903eaebac1a2cc8c4698379e7e674e8b.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
db4ede1b9360f8892a7b938d7df6bb04903eaebac1a2cc8c4698379e7e674e8b
-
Size
564KB
-
MD5
a98472547c0fe8d8d1f8721afbe9bc88
-
SHA1
7964e9df148f64ccb32274f60d0e2cf1d97914a6
-
SHA256
db4ede1b9360f8892a7b938d7df6bb04903eaebac1a2cc8c4698379e7e674e8b
-
SHA512
3d18c88143862841691a30d4bc926a041443deaa338508d914beafb67581a2b05fd812e1df9a40c35788af8388935e1ad415d46aed5bad706b803b0e4fbf7cec
-
SSDEEP
12288:+MrLy90az97YCpSr8deA7nJHS7AYe2Mfr1VeGJ/jyN2BgfxAS:9yz97YCQr8e8HzY7010GHBiAS
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1