General
-
Target
033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99
-
Size
828KB
-
Sample
230822-q566haea81
-
MD5
95d7001ea74c030a925aa7156404230b
-
SHA1
c2c01a70ddd3ebd9d47cc252a0269c52914031f0
-
SHA256
033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99
-
SHA512
008f91bc0cf9d6493cdb14ac6cb655415a6176231150bbff779d07a4a3b9b0c6e59fd6bdf8e3428d598b235f1aadd8f5104f0b12edf1776c78b1f9c35c972bd0
-
SSDEEP
24576:2yP2IhVl9ZgTE2WI0hib1AVki2pHQcG0:FZpP2WI0hipAj+
Static task
static1
Behavioral task
behavioral1
Sample
033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Targets
-
-
Target
033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99
-
Size
828KB
-
MD5
95d7001ea74c030a925aa7156404230b
-
SHA1
c2c01a70ddd3ebd9d47cc252a0269c52914031f0
-
SHA256
033672b2b74532d7259bd6d4665c7211f11c5774fadb28c73e051a31fda76e99
-
SHA512
008f91bc0cf9d6493cdb14ac6cb655415a6176231150bbff779d07a4a3b9b0c6e59fd6bdf8e3428d598b235f1aadd8f5104f0b12edf1776c78b1f9c35c972bd0
-
SSDEEP
24576:2yP2IhVl9ZgTE2WI0hib1AVki2pHQcG0:FZpP2WI0hipAj+
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1