General
-
Target
744740aac036b70091d59100b759d69be2e44c39896c47549640adb39b7a4c45
-
Size
563KB
-
Sample
230817-j3ly8agc74
-
MD5
a7bbb957c95cc482fbf153844d2ef985
-
SHA1
858359a1bda1b135849e4e638b1b12480e84e837
-
SHA256
744740aac036b70091d59100b759d69be2e44c39896c47549640adb39b7a4c45
-
SHA512
04c55513f5212b5ddbb899b34c91f7e7538637434daeb801b759367096e2ccedf773a1da14ca4e212637ce01c38774ab77582bf0c737f64c194d4d2b606c13fb
-
SSDEEP
12288:UMrfy90ZsJaqTDSvqcJoG9QaZNxPOHtrtGg/YYGoZtb:TyAsEqTDq9H6PGgEytb
Static task
static1
Behavioral task
behavioral1
Sample
744740aac036b70091d59100b759d69be2e44c39896c47549640adb39b7a4c45.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
744740aac036b70091d59100b759d69be2e44c39896c47549640adb39b7a4c45
-
Size
563KB
-
MD5
a7bbb957c95cc482fbf153844d2ef985
-
SHA1
858359a1bda1b135849e4e638b1b12480e84e837
-
SHA256
744740aac036b70091d59100b759d69be2e44c39896c47549640adb39b7a4c45
-
SHA512
04c55513f5212b5ddbb899b34c91f7e7538637434daeb801b759367096e2ccedf773a1da14ca4e212637ce01c38774ab77582bf0c737f64c194d4d2b606c13fb
-
SSDEEP
12288:UMrfy90ZsJaqTDSvqcJoG9QaZNxPOHtrtGg/YYGoZtb:TyAsEqTDq9H6PGgEytb
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1