General
-
Target
afa6ccb4c0ef9f6b89cff27f6d9a125905ca4568b47a4ba68f20c2cc2a78bd6c
-
Size
929KB
-
Sample
230825-crmytagf36
-
MD5
85e98f423baa8333198f250d3527ec53
-
SHA1
2ad44e8f7382263caa9d9473c4f0b01df8908dff
-
SHA256
afa6ccb4c0ef9f6b89cff27f6d9a125905ca4568b47a4ba68f20c2cc2a78bd6c
-
SHA512
af607c60ebb56f1411198235878da09c70304835bcebf971c8609fff8d9341aa233b310bb4533acebfdb739fbc5bf64cb82ab16da9b33e0e15f31e8742851fec
-
SSDEEP
24576:Ty43MddLmWJJMuErLIZVXW3jo9vZehqihVFyUsp8SS:m4qdLmWJqqjOjoIVt
Static task
static1
Behavioral task
behavioral1
Sample
afa6ccb4c0ef9f6b89cff27f6d9a125905ca4568b47a4ba68f20c2cc2a78bd6c.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Targets
-
-
Target
afa6ccb4c0ef9f6b89cff27f6d9a125905ca4568b47a4ba68f20c2cc2a78bd6c
-
Size
929KB
-
MD5
85e98f423baa8333198f250d3527ec53
-
SHA1
2ad44e8f7382263caa9d9473c4f0b01df8908dff
-
SHA256
afa6ccb4c0ef9f6b89cff27f6d9a125905ca4568b47a4ba68f20c2cc2a78bd6c
-
SHA512
af607c60ebb56f1411198235878da09c70304835bcebf971c8609fff8d9341aa233b310bb4533acebfdb739fbc5bf64cb82ab16da9b33e0e15f31e8742851fec
-
SSDEEP
24576:Ty43MddLmWJJMuErLIZVXW3jo9vZehqihVFyUsp8SS:m4qdLmWJqqjOjoIVt
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1