General
-
Target
30c777ea0cb0b873447727b17e38aeed38f27d64e59137670dea80fe02928660
-
Size
828KB
-
Sample
230822-t7zqzsdf79
-
MD5
282a97054c0c7457c9a6e25cc5b373bb
-
SHA1
0c64fc02ab56bdf6f7399d53b23f0537c2ab6c32
-
SHA256
30c777ea0cb0b873447727b17e38aeed38f27d64e59137670dea80fe02928660
-
SHA512
24e6ecc7196f3eefac8e02bda3a50ee2c2649c644e550d44e9892c7a0df1270817d5add82251d9e7002541efe286c7b1d96b763a6b309ed198cf04b0f278475f
-
SSDEEP
12288:NMrKy90M/WuGwV9AvSkUpQvYgUH1NqMvNpwTOn3+PafICB4I5d5TJoguaWkEV201:vyVuuGwVuEpEYdETOnKawaZ5T98d1
Static task
static1
Behavioral task
behavioral1
Sample
30c777ea0cb0b873447727b17e38aeed38f27d64e59137670dea80fe02928660.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Targets
-
-
Target
30c777ea0cb0b873447727b17e38aeed38f27d64e59137670dea80fe02928660
-
Size
828KB
-
MD5
282a97054c0c7457c9a6e25cc5b373bb
-
SHA1
0c64fc02ab56bdf6f7399d53b23f0537c2ab6c32
-
SHA256
30c777ea0cb0b873447727b17e38aeed38f27d64e59137670dea80fe02928660
-
SHA512
24e6ecc7196f3eefac8e02bda3a50ee2c2649c644e550d44e9892c7a0df1270817d5add82251d9e7002541efe286c7b1d96b763a6b309ed198cf04b0f278475f
-
SSDEEP
12288:NMrKy90M/WuGwV9AvSkUpQvYgUH1NqMvNpwTOn3+PafICB4I5d5TJoguaWkEV201:vyVuuGwVuEpEYdETOnKawaZ5T98d1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1