General
-
Target
58798a0eba92738b9c6a4474372dad5808d69a7a06fd59967522c54c9fa538c3
-
Size
564KB
-
Sample
230817-ptk88ahc86
-
MD5
7c8e91866d0fca366b36f4f0b88dd7b3
-
SHA1
2c43d677b8ab2cf2aae3d43571b7fd7f7e5260a1
-
SHA256
58798a0eba92738b9c6a4474372dad5808d69a7a06fd59967522c54c9fa538c3
-
SHA512
9d41202d2d34b58d7ec211c6c821398f5f70263978f951a1904b0f297f01f8f3a3e2516cbfbeffff916b9b7f5b12ee9a7e85904e75f3367b45b6adac357f4807
-
SSDEEP
12288:yMrny90hgZuELzf3yDDQgZUI6OOXN+BvCt8Rj:tyigRf3yDdZUI/MOvCeRj
Static task
static1
Behavioral task
behavioral1
Sample
58798a0eba92738b9c6a4474372dad5808d69a7a06fd59967522c54c9fa538c3.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Targets
-
-
Target
58798a0eba92738b9c6a4474372dad5808d69a7a06fd59967522c54c9fa538c3
-
Size
564KB
-
MD5
7c8e91866d0fca366b36f4f0b88dd7b3
-
SHA1
2c43d677b8ab2cf2aae3d43571b7fd7f7e5260a1
-
SHA256
58798a0eba92738b9c6a4474372dad5808d69a7a06fd59967522c54c9fa538c3
-
SHA512
9d41202d2d34b58d7ec211c6c821398f5f70263978f951a1904b0f297f01f8f3a3e2516cbfbeffff916b9b7f5b12ee9a7e85904e75f3367b45b6adac357f4807
-
SSDEEP
12288:yMrny90hgZuELzf3yDDQgZUI6OOXN+BvCt8Rj:tyigRf3yDdZUI/MOvCeRj
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1