General
-
Target
a004580b36295932f87e0f894ffbbece3bc05e14f10e53dab55bb873cf570415
-
Size
929KB
-
Sample
230824-vhaagaff7t
-
MD5
4da9e3ac72711009ccef1ae75a114dd4
-
SHA1
67e067b57efc5f571b8e6b13dbfcb5c102845088
-
SHA256
a004580b36295932f87e0f894ffbbece3bc05e14f10e53dab55bb873cf570415
-
SHA512
dd1af947394584555719f215e68fbd130dd5db0e44fbe61d339606cc66fa71776080387ba5f4cbafa89e989bfdef6d85ea1f494ac8537e44b181a3bf7cb3712a
-
SSDEEP
24576:Myty0dBOTaHtH9mBra10SNamqzp+WJzmCtGFYdD/:77d4TYHqcNuz8WjGa
Static task
static1
Behavioral task
behavioral1
Sample
a004580b36295932f87e0f894ffbbece3bc05e14f10e53dab55bb873cf570415.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Targets
-
-
Target
a004580b36295932f87e0f894ffbbece3bc05e14f10e53dab55bb873cf570415
-
Size
929KB
-
MD5
4da9e3ac72711009ccef1ae75a114dd4
-
SHA1
67e067b57efc5f571b8e6b13dbfcb5c102845088
-
SHA256
a004580b36295932f87e0f894ffbbece3bc05e14f10e53dab55bb873cf570415
-
SHA512
dd1af947394584555719f215e68fbd130dd5db0e44fbe61d339606cc66fa71776080387ba5f4cbafa89e989bfdef6d85ea1f494ac8537e44b181a3bf7cb3712a
-
SSDEEP
24576:Myty0dBOTaHtH9mBra10SNamqzp+WJzmCtGFYdD/:77d4TYHqcNuz8WjGa
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1