General
-
Target
87ce7772cab3b8152950d3474bd2b2bc94b14856217ae918c2259c8bd1f3c34b
-
Size
828KB
-
Sample
230824-c64j4sah9v
-
MD5
233afe406dfcced9245b3a6ff8bbc843
-
SHA1
f7d8038c2a5cede67b916c86d303a2a236f7770d
-
SHA256
87ce7772cab3b8152950d3474bd2b2bc94b14856217ae918c2259c8bd1f3c34b
-
SHA512
8498f3084ff80e577bfb16dfbb00e0c02a726be6cad2c3db800ac75d5f04e1749af307df29d271f0fbf8cf1c882dcdcec881cf1e2aeb3eb5141b67c95bbefd5e
-
SSDEEP
24576:7yhsHBKhqutAxGcRD5YMVxFcYi7r7FOFI:uihxEYrt5P7cYiXRG
Static task
static1
Behavioral task
behavioral1
Sample
87ce7772cab3b8152950d3474bd2b2bc94b14856217ae918c2259c8bd1f3c34b.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Targets
-
-
Target
87ce7772cab3b8152950d3474bd2b2bc94b14856217ae918c2259c8bd1f3c34b
-
Size
828KB
-
MD5
233afe406dfcced9245b3a6ff8bbc843
-
SHA1
f7d8038c2a5cede67b916c86d303a2a236f7770d
-
SHA256
87ce7772cab3b8152950d3474bd2b2bc94b14856217ae918c2259c8bd1f3c34b
-
SHA512
8498f3084ff80e577bfb16dfbb00e0c02a726be6cad2c3db800ac75d5f04e1749af307df29d271f0fbf8cf1c882dcdcec881cf1e2aeb3eb5141b67c95bbefd5e
-
SSDEEP
24576:7yhsHBKhqutAxGcRD5YMVxFcYi7r7FOFI:uihxEYrt5P7cYiXRG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1