General
-
Target
0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003
-
Size
564KB
-
Sample
230818-bnwk4see65
-
MD5
58399942b8c8fc3360bdaf02eeca3d08
-
SHA1
9135b166ad6fa57edbbb4a4daa2118b6603b7294
-
SHA256
0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003
-
SHA512
2c3f102dd8ca577bdf8e6b9eab1fb763613a76ee2220724bf2e66b74eeed6768571b8d445531559d3c5b7b8d482e08e863a88271143172e5ee6b0c6c1345562d
-
SSDEEP
12288:QMr7y90VMQmc4excUlpbK2qNhW6uNfmGKAjTxBEOAS:7yBQv2u1chWNNXj3AS
Static task
static1
Behavioral task
behavioral1
Sample
0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Targets
-
-
Target
0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003
-
Size
564KB
-
MD5
58399942b8c8fc3360bdaf02eeca3d08
-
SHA1
9135b166ad6fa57edbbb4a4daa2118b6603b7294
-
SHA256
0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003
-
SHA512
2c3f102dd8ca577bdf8e6b9eab1fb763613a76ee2220724bf2e66b74eeed6768571b8d445531559d3c5b7b8d482e08e863a88271143172e5ee6b0c6c1345562d
-
SSDEEP
12288:QMr7y90VMQmc4excUlpbK2qNhW6uNfmGKAjTxBEOAS:7yBQv2u1chWNNXj3AS
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1