General
-
Target
be87ca89ec15275d9daa849316e6147cfd879f0734a1fa5893178d34db7064fa
-
Size
818KB
-
Sample
230823-l6sx2sch2x
-
MD5
cfa5872a95dbd96b34baf23de615d550
-
SHA1
8c8afeeeeb9c1ffd83cd20a2c37cf170113d5785
-
SHA256
be87ca89ec15275d9daa849316e6147cfd879f0734a1fa5893178d34db7064fa
-
SHA512
7eab24d4c6b4e1fac208ed2fa79be829a7f35088953bbe232753398e6472d9516e871f4cfb6a15c259068705769d3bed7f86ac198c5313704bc223a07f2e886f
-
SSDEEP
12288:zMr+y90NiBbDuI2q1500W2R0sWeMkm+Ilz5WqXkutmvNKTpmj6sCTsbIR6mhSGgg:ByOGDuI2ZzxHlNWqXkuUCmjHCTv6mhb
Static task
static1
Behavioral task
behavioral1
Sample
be87ca89ec15275d9daa849316e6147cfd879f0734a1fa5893178d34db7064fa.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Targets
-
-
Target
be87ca89ec15275d9daa849316e6147cfd879f0734a1fa5893178d34db7064fa
-
Size
818KB
-
MD5
cfa5872a95dbd96b34baf23de615d550
-
SHA1
8c8afeeeeb9c1ffd83cd20a2c37cf170113d5785
-
SHA256
be87ca89ec15275d9daa849316e6147cfd879f0734a1fa5893178d34db7064fa
-
SHA512
7eab24d4c6b4e1fac208ed2fa79be829a7f35088953bbe232753398e6472d9516e871f4cfb6a15c259068705769d3bed7f86ac198c5313704bc223a07f2e886f
-
SSDEEP
12288:zMr+y90NiBbDuI2q1500W2R0sWeMkm+Ilz5WqXkutmvNKTpmj6sCTsbIR6mhSGgg:ByOGDuI2ZzxHlNWqXkuUCmjHCTv6mhb
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1