General
-
Target
be19d3543df56192cd36aed7d7db938fe84bba757674bf88144d19078edc6c23
-
Size
505KB
-
Sample
230817-faj3dafc54
-
MD5
80abd35ac018258656f4664f3be87dd2
-
SHA1
512a11fbf1c878cdfee8a185c165fdeb2ac87bba
-
SHA256
be19d3543df56192cd36aed7d7db938fe84bba757674bf88144d19078edc6c23
-
SHA512
131664befe08a91269709caa35da93c63f2874bee98e68db6601be6be8434c1bc4ce87560c8ed4cfea0783896aad3f3fd986f40d122563714768dd8acb5aa9e4
-
SSDEEP
6144:Kuy+bnr+fp0yN90QEQoJAX9WAuo240akzy4piZvH6ELyffTMNNZRSpPR1vURx+Ih:6Mr7y90RAX9elxFiXwfTMNNS34+IeS
Static task
static1
Behavioral task
behavioral1
Sample
be19d3543df56192cd36aed7d7db938fe84bba757674bf88144d19078edc6c23.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
be19d3543df56192cd36aed7d7db938fe84bba757674bf88144d19078edc6c23
-
Size
505KB
-
MD5
80abd35ac018258656f4664f3be87dd2
-
SHA1
512a11fbf1c878cdfee8a185c165fdeb2ac87bba
-
SHA256
be19d3543df56192cd36aed7d7db938fe84bba757674bf88144d19078edc6c23
-
SHA512
131664befe08a91269709caa35da93c63f2874bee98e68db6601be6be8434c1bc4ce87560c8ed4cfea0783896aad3f3fd986f40d122563714768dd8acb5aa9e4
-
SSDEEP
6144:Kuy+bnr+fp0yN90QEQoJAX9WAuo240akzy4piZvH6ELyffTMNNZRSpPR1vURx+Ih:6Mr7y90RAX9elxFiXwfTMNNS34+IeS
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1