General
-
Target
636c1baeefcbcdf9eb90eae5a7f87aa42a10bfeb67b39b55300f164d70196312
-
Size
564KB
-
Sample
230817-lpmdyagf85
-
MD5
0a35f9f79e11f242b6f7b188cb412889
-
SHA1
0dbefff228a0ae40ef3b48a747cefe0a79f8259d
-
SHA256
636c1baeefcbcdf9eb90eae5a7f87aa42a10bfeb67b39b55300f164d70196312
-
SHA512
a567244f44be5518f068babeedd87fbad34dd99890c83c9ce3d74b3e32fb7880ea93c71d0d74001a7325d83f5aff6709488b861bbd41b430957daba94c7179c1
-
SSDEEP
6144:Kdy+bnr+Pp0yN90QEUls0ZWQ4iXkW8nZNXcPE6Nsaimc58KteAXaLFdQ4/SshAV5:PMrry90KlVqiq6amg4x6shKJ4YWE5l
Static task
static1
Behavioral task
behavioral1
Sample
636c1baeefcbcdf9eb90eae5a7f87aa42a10bfeb67b39b55300f164d70196312.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Targets
-
-
Target
636c1baeefcbcdf9eb90eae5a7f87aa42a10bfeb67b39b55300f164d70196312
-
Size
564KB
-
MD5
0a35f9f79e11f242b6f7b188cb412889
-
SHA1
0dbefff228a0ae40ef3b48a747cefe0a79f8259d
-
SHA256
636c1baeefcbcdf9eb90eae5a7f87aa42a10bfeb67b39b55300f164d70196312
-
SHA512
a567244f44be5518f068babeedd87fbad34dd99890c83c9ce3d74b3e32fb7880ea93c71d0d74001a7325d83f5aff6709488b861bbd41b430957daba94c7179c1
-
SSDEEP
6144:Kdy+bnr+Pp0yN90QEUls0ZWQ4iXkW8nZNXcPE6Nsaimc58KteAXaLFdQ4/SshAV5:PMrry90KlVqiq6amg4x6shKJ4YWE5l
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1