General
-
Target
99462d5c477917aa11c2465de9d54472089e74fa7d98bc008f14d18bf8efd475
-
Size
505KB
-
Sample
230817-m7z87aaf5z
-
MD5
10c8c5983d5db4b2f545a0f29cc01bff
-
SHA1
4ebfff1700470a3aa108e609ac6803b05c20cb33
-
SHA256
99462d5c477917aa11c2465de9d54472089e74fa7d98bc008f14d18bf8efd475
-
SHA512
9b3e87fbb1d4b22aa8bf61928d0856f4444b2a48fbd1cc303fe1fca72328e255dfa69e09533724e305e2b9772b00d635360abc8a07dd9e13a3ad70d0778286a3
-
SSDEEP
12288:7Mrzy90oGAdT8HovLAfzZvLjRg8/WIxEW39:IyfGAJ8HULAfzZvfOuWIiW39
Static task
static1
Behavioral task
behavioral1
Sample
99462d5c477917aa11c2465de9d54472089e74fa7d98bc008f14d18bf8efd475.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Targets
-
-
Target
99462d5c477917aa11c2465de9d54472089e74fa7d98bc008f14d18bf8efd475
-
Size
505KB
-
MD5
10c8c5983d5db4b2f545a0f29cc01bff
-
SHA1
4ebfff1700470a3aa108e609ac6803b05c20cb33
-
SHA256
99462d5c477917aa11c2465de9d54472089e74fa7d98bc008f14d18bf8efd475
-
SHA512
9b3e87fbb1d4b22aa8bf61928d0856f4444b2a48fbd1cc303fe1fca72328e255dfa69e09533724e305e2b9772b00d635360abc8a07dd9e13a3ad70d0778286a3
-
SSDEEP
12288:7Mrzy90oGAdT8HovLAfzZvLjRg8/WIxEW39:IyfGAJ8HULAfzZvfOuWIiW39
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1