General
-
Target
d17fe3d60b1e58ec6d7742f8913694f4db31bebd9786a801dd67b296762ff2e2
-
Size
564KB
-
Sample
230816-g89lcsgb94
-
MD5
61ca2c728b712c02827f75a099b88fbe
-
SHA1
009c26a0c1fa685a60b6289c33b012bc2053cf41
-
SHA256
d17fe3d60b1e58ec6d7742f8913694f4db31bebd9786a801dd67b296762ff2e2
-
SHA512
df029c92c4ad7eebdcbb424b45706d1e6b8f73b524b697014faeacf65fea8f0a32d225f968234bc67d0c61d5963ea840c994e7517521f5f9ebff777d8940aa48
-
SSDEEP
12288:VMrXy90y3ZA3aezl8711rKiuljGUBCmPusUcIp6s:2ylezoKiul/BMVDpJ
Static task
static1
Behavioral task
behavioral1
Sample
d17fe3d60b1e58ec6d7742f8913694f4db31bebd9786a801dd67b296762ff2e2.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
d17fe3d60b1e58ec6d7742f8913694f4db31bebd9786a801dd67b296762ff2e2
-
Size
564KB
-
MD5
61ca2c728b712c02827f75a099b88fbe
-
SHA1
009c26a0c1fa685a60b6289c33b012bc2053cf41
-
SHA256
d17fe3d60b1e58ec6d7742f8913694f4db31bebd9786a801dd67b296762ff2e2
-
SHA512
df029c92c4ad7eebdcbb424b45706d1e6b8f73b524b697014faeacf65fea8f0a32d225f968234bc67d0c61d5963ea840c994e7517521f5f9ebff777d8940aa48
-
SSDEEP
12288:VMrXy90y3ZA3aezl8711rKiuljGUBCmPusUcIp6s:2ylezoKiul/BMVDpJ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1