General
-
Target
2d3a77b94a439c9dcd292c6a6447a039d7b3b35cd69e28d1f5fb42403e3924db
-
Size
505KB
-
Sample
230817-j99nvsab2w
-
MD5
3e17cd3223bf29eb116fce89a39a1451
-
SHA1
b61e52644a9ec982b46f6f8e1d859d2bd0569fbe
-
SHA256
2d3a77b94a439c9dcd292c6a6447a039d7b3b35cd69e28d1f5fb42403e3924db
-
SHA512
8426b685dc32a06d50bc16cec5e593c31c11ff89bea97bc04dc1845396f4b645f86dd9d4cd12b88caf28320c037a8c9323de362b8698290e065c98b024640b1e
-
SSDEEP
12288:tMrRy90wfmEigoJNalAE1rEhY+saKftjjgZ:4yVM/eKOYhY+tK1MZ
Static task
static1
Behavioral task
behavioral1
Sample
2d3a77b94a439c9dcd292c6a6447a039d7b3b35cd69e28d1f5fb42403e3924db.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
2d3a77b94a439c9dcd292c6a6447a039d7b3b35cd69e28d1f5fb42403e3924db
-
Size
505KB
-
MD5
3e17cd3223bf29eb116fce89a39a1451
-
SHA1
b61e52644a9ec982b46f6f8e1d859d2bd0569fbe
-
SHA256
2d3a77b94a439c9dcd292c6a6447a039d7b3b35cd69e28d1f5fb42403e3924db
-
SHA512
8426b685dc32a06d50bc16cec5e593c31c11ff89bea97bc04dc1845396f4b645f86dd9d4cd12b88caf28320c037a8c9323de362b8698290e065c98b024640b1e
-
SSDEEP
12288:tMrRy90wfmEigoJNalAE1rEhY+saKftjjgZ:4yVM/eKOYhY+tK1MZ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1