General
-
Target
a6badd0e1c92e94bef6631b881a66946e7be1257b15e3e85088f4936e2c030e3
-
Size
822KB
-
Sample
230825-31hzbshd6z
-
MD5
44a8530c50fdcf99bf60c3b5657061d8
-
SHA1
c572d24b32a9ca2559d919545ba68a9a0b5037c8
-
SHA256
a6badd0e1c92e94bef6631b881a66946e7be1257b15e3e85088f4936e2c030e3
-
SHA512
eab96b67e078903f9a0af123a396b6272acc50071359c1b699bf65a5ebc18de25d014a0031011ed14eeaff2d752345ddc65930e714c6130df4a9f92681a3b5da
-
SSDEEP
12288:tMr8y900X4OnHNtEo8C+OGy4aQdI8zin48O4jXPoL7v5CKVL4xDb63bRH4S2gsDK:dyTHZ1LG9SNhvPso+IbcFQ7m
Static task
static1
Behavioral task
behavioral1
Sample
a6badd0e1c92e94bef6631b881a66946e7be1257b15e3e85088f4936e2c030e3.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Targets
-
-
Target
a6badd0e1c92e94bef6631b881a66946e7be1257b15e3e85088f4936e2c030e3
-
Size
822KB
-
MD5
44a8530c50fdcf99bf60c3b5657061d8
-
SHA1
c572d24b32a9ca2559d919545ba68a9a0b5037c8
-
SHA256
a6badd0e1c92e94bef6631b881a66946e7be1257b15e3e85088f4936e2c030e3
-
SHA512
eab96b67e078903f9a0af123a396b6272acc50071359c1b699bf65a5ebc18de25d014a0031011ed14eeaff2d752345ddc65930e714c6130df4a9f92681a3b5da
-
SSDEEP
12288:tMr8y900X4OnHNtEo8C+OGy4aQdI8zin48O4jXPoL7v5CKVL4xDb63bRH4S2gsDK:dyTHZ1LG9SNhvPso+IbcFQ7m
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1