General
-
Target
8567b6e192c9cc59473e671bed8dbadffd2c3bf4372f5a65e2c8ca0390b3bfbb
-
Size
830KB
-
Sample
230821-trbzzsfg51
-
MD5
c1ab3d743c1e68bba7c576c4d4ff9abe
-
SHA1
3a0cdd77af567674527e581b3f549c2a8b537ffa
-
SHA256
8567b6e192c9cc59473e671bed8dbadffd2c3bf4372f5a65e2c8ca0390b3bfbb
-
SHA512
2b49460509c0c03f0b79b0ef48dbb92152d454d1d0062b489a73b4b44f5a8e4e9a1ee77c2c2e2e8574a8014eaf8dc63453fe0dd0cd67a49431c745b779705a28
-
SSDEEP
24576:EyC0cYIOfaMlFKkmmwK9AU8SN0nsP4DWsVJcFqt92ge:TCrOfkkKKmTSvsIFq
Static task
static1
Behavioral task
behavioral1
Sample
8567b6e192c9cc59473e671bed8dbadffd2c3bf4372f5a65e2c8ca0390b3bfbb.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
lang
77.91.124.73:19071
-
auth_value
92c0fc2b7a8b3fc5a01baa1abf31c42a
Targets
-
-
Target
8567b6e192c9cc59473e671bed8dbadffd2c3bf4372f5a65e2c8ca0390b3bfbb
-
Size
830KB
-
MD5
c1ab3d743c1e68bba7c576c4d4ff9abe
-
SHA1
3a0cdd77af567674527e581b3f549c2a8b537ffa
-
SHA256
8567b6e192c9cc59473e671bed8dbadffd2c3bf4372f5a65e2c8ca0390b3bfbb
-
SHA512
2b49460509c0c03f0b79b0ef48dbb92152d454d1d0062b489a73b4b44f5a8e4e9a1ee77c2c2e2e8574a8014eaf8dc63453fe0dd0cd67a49431c745b779705a28
-
SSDEEP
24576:EyC0cYIOfaMlFKkmmwK9AU8SN0nsP4DWsVJcFqt92ge:TCrOfkkKKmTSvsIFq
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1