General
-
Target
e8e75cc08f4e063acdd264ba9ec3e262964cff3261018e22a8fbf9dbb20aaf32
-
Size
838KB
-
Sample
230821-wabzrseg79
-
MD5
e120475d11653ee5ea143b15b8a52f26
-
SHA1
f4af17a10936331a319a3faef8b3e23e28147c24
-
SHA256
e8e75cc08f4e063acdd264ba9ec3e262964cff3261018e22a8fbf9dbb20aaf32
-
SHA512
e656af10ed5f76ea904c3533a47d119d5fc621b46a36dc0200816ac5a1f8bb0719a7a26141db24321a15234a8a361bd18bfac538076c192d35deec05125f3db8
-
SSDEEP
12288:FMrLy90FTQINlG4erg+yly5wXa+Ul1TZNhRfpJzv8+RNwt/hbgCzLDEwiZof:CyfKMBglrBehxo2NyZkCzLDEwh
Static task
static1
Behavioral task
behavioral1
Sample
e8e75cc08f4e063acdd264ba9ec3e262964cff3261018e22a8fbf9dbb20aaf32.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
lang
77.91.124.73:19071
-
auth_value
92c0fc2b7a8b3fc5a01baa1abf31c42a
Targets
-
-
Target
e8e75cc08f4e063acdd264ba9ec3e262964cff3261018e22a8fbf9dbb20aaf32
-
Size
838KB
-
MD5
e120475d11653ee5ea143b15b8a52f26
-
SHA1
f4af17a10936331a319a3faef8b3e23e28147c24
-
SHA256
e8e75cc08f4e063acdd264ba9ec3e262964cff3261018e22a8fbf9dbb20aaf32
-
SHA512
e656af10ed5f76ea904c3533a47d119d5fc621b46a36dc0200816ac5a1f8bb0719a7a26141db24321a15234a8a361bd18bfac538076c192d35deec05125f3db8
-
SSDEEP
12288:FMrLy90FTQINlG4erg+yly5wXa+Ul1TZNhRfpJzv8+RNwt/hbgCzLDEwiZof:CyfKMBglrBehxo2NyZkCzLDEwh
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1