General
-
Target
6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d
-
Size
828KB
-
Sample
230824-axwf2aac3s
-
MD5
c3dfef4def94c6eab7d2d8fca0bbf1a8
-
SHA1
a95041493e8bfa1db7fe76471f7312e5285cb2ad
-
SHA256
6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d
-
SHA512
24eff8afb97db8ab80bfebc92d48e0daefd890d38d8d9e9d199081a3fc620875cf0bb829a5aff4b12ee37b1ed95d56a48aff556e121001ff4519be95f2455246
-
SSDEEP
24576:jyvjqm9grXa1lELDxP0oJz14DVZzPjE3E:22ygrq1ADZZJCPw
Static task
static1
Behavioral task
behavioral1
Sample
6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
gogi
77.91.124.73:19071
-
auth_value
c7dbabcf1eff128a595c7532cb5489a8
Targets
-
-
Target
6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d
-
Size
828KB
-
MD5
c3dfef4def94c6eab7d2d8fca0bbf1a8
-
SHA1
a95041493e8bfa1db7fe76471f7312e5285cb2ad
-
SHA256
6a78f1986b2318c67f021027b27461c2c34af7bddaa8b8e6177c9eed2daa417d
-
SHA512
24eff8afb97db8ab80bfebc92d48e0daefd890d38d8d9e9d199081a3fc620875cf0bb829a5aff4b12ee37b1ed95d56a48aff556e121001ff4519be95f2455246
-
SSDEEP
24576:jyvjqm9grXa1lELDxP0oJz14DVZzPjE3E:22ygrq1ADZZJCPw
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1