General
-
Target
98f361054cd124f7066666dbbdd7620424ccb8934de59ad6c3ce7dc5c16aee40
-
Size
928KB
-
Sample
230825-dx5lgsad4t
-
MD5
ee4c6e1364e54547e1f3433cae994063
-
SHA1
b0cbdfbb7fc40a7e408c8ac75472d62b896ac2f9
-
SHA256
98f361054cd124f7066666dbbdd7620424ccb8934de59ad6c3ce7dc5c16aee40
-
SHA512
bdaeb75ae598ca263b70539f302b81de54b485645302c9218e8b19398261e4959ef19eed265b73e2dd1343910a1c49ad6e918bfbbc1327022efaa87290e626b1
-
SSDEEP
24576:yyhJjGRRUnuEsv52tOXO65qnt0lXLO1zUj:ZhuRwuxvHz4t0Za
Static task
static1
Behavioral task
behavioral1
Sample
98f361054cd124f7066666dbbdd7620424ccb8934de59ad6c3ce7dc5c16aee40.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Targets
-
-
Target
98f361054cd124f7066666dbbdd7620424ccb8934de59ad6c3ce7dc5c16aee40
-
Size
928KB
-
MD5
ee4c6e1364e54547e1f3433cae994063
-
SHA1
b0cbdfbb7fc40a7e408c8ac75472d62b896ac2f9
-
SHA256
98f361054cd124f7066666dbbdd7620424ccb8934de59ad6c3ce7dc5c16aee40
-
SHA512
bdaeb75ae598ca263b70539f302b81de54b485645302c9218e8b19398261e4959ef19eed265b73e2dd1343910a1c49ad6e918bfbbc1327022efaa87290e626b1
-
SSDEEP
24576:yyhJjGRRUnuEsv52tOXO65qnt0lXLO1zUj:ZhuRwuxvHz4t0Za
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1