General
-
Target
0909baaf53e6a619c59a38ed97abdca6a71349c2934347302fcd8a6ab680a2b9
-
Size
838KB
-
Sample
230822-plsckacb49
-
MD5
06e34c8370ceced829d51f2d4e5fb63e
-
SHA1
d22a2ca9e64e3e1e9347c97a3b8cdd6fa202ad57
-
SHA256
0909baaf53e6a619c59a38ed97abdca6a71349c2934347302fcd8a6ab680a2b9
-
SHA512
32c7ddb41087bf398e6ecfbc9e3454d243b68b21289c9519529da7ccba7849305803fb7794db660a8113d6c97eed4b70beb7558a1eeb6dc04a339fc0739ba739
-
SSDEEP
24576:ryYjRJ30P7469Szbue2KbmEBDIV6CGahw:eKkzdu32KbW6CGah
Static task
static1
Behavioral task
behavioral1
Sample
0909baaf53e6a619c59a38ed97abdca6a71349c2934347302fcd8a6ab680a2b9.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Targets
-
-
Target
0909baaf53e6a619c59a38ed97abdca6a71349c2934347302fcd8a6ab680a2b9
-
Size
838KB
-
MD5
06e34c8370ceced829d51f2d4e5fb63e
-
SHA1
d22a2ca9e64e3e1e9347c97a3b8cdd6fa202ad57
-
SHA256
0909baaf53e6a619c59a38ed97abdca6a71349c2934347302fcd8a6ab680a2b9
-
SHA512
32c7ddb41087bf398e6ecfbc9e3454d243b68b21289c9519529da7ccba7849305803fb7794db660a8113d6c97eed4b70beb7558a1eeb6dc04a339fc0739ba739
-
SSDEEP
24576:ryYjRJ30P7469Szbue2KbmEBDIV6CGahw:eKkzdu32KbW6CGah
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1