General
-
Target
53b8938435ed751d3dd1f6c9413e76db7a2cf75ff5de29009d9eb70ceeefc7b0
-
Size
930KB
-
Sample
230824-fr3k2sac48
-
MD5
07aa12bedcc4caf5244bd29425072710
-
SHA1
1397635e34a6804d0f116c1f6e82466886f8991a
-
SHA256
53b8938435ed751d3dd1f6c9413e76db7a2cf75ff5de29009d9eb70ceeefc7b0
-
SHA512
0ac8df3bfbb8cb2fa7f9a9c3b159c34a814385f54813c1694540094b90ab34aa6a2f0f04f3c1ac417dc4a7799244c942e818d28f463512a0f9646f3a830859ca
-
SSDEEP
24576:0yJ4ImXmOmHDJFCbPPRwb8JlGZSZG13a3RmiFl:DJnJx3eRwbKIumisq
Static task
static1
Behavioral task
behavioral1
Sample
53b8938435ed751d3dd1f6c9413e76db7a2cf75ff5de29009d9eb70ceeefc7b0.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Targets
-
-
Target
53b8938435ed751d3dd1f6c9413e76db7a2cf75ff5de29009d9eb70ceeefc7b0
-
Size
930KB
-
MD5
07aa12bedcc4caf5244bd29425072710
-
SHA1
1397635e34a6804d0f116c1f6e82466886f8991a
-
SHA256
53b8938435ed751d3dd1f6c9413e76db7a2cf75ff5de29009d9eb70ceeefc7b0
-
SHA512
0ac8df3bfbb8cb2fa7f9a9c3b159c34a814385f54813c1694540094b90ab34aa6a2f0f04f3c1ac417dc4a7799244c942e818d28f463512a0f9646f3a830859ca
-
SSDEEP
24576:0yJ4ImXmOmHDJFCbPPRwb8JlGZSZG13a3RmiFl:DJnJx3eRwbKIumisq
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1