General
-
Target
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5
-
Size
829KB
-
Sample
230827-fksr9sfe77
-
MD5
a82a8ffef07b6ba5fcb6e278febe13ab
-
SHA1
d7dfc78d760b93114550deb4b1f142bcace6bf23
-
SHA256
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5
-
SHA512
b86fbf1cbf0ca6b3abd2ed9bd3db4b55bd9486484a82aa71e71d023d8675378b559eecb0ae6845a2cdc1c21b77086d56a163dcd535f145f17ea57eab2258c6a6
-
SSDEEP
12288:2MrWy90R8g7RMrzXq5HKlEPwo+ia6iAjgLDnV6V2JKEILGy9fhsD1T2bBi:kyA8+ISHYEPA6ifnVK1RDs5T2b0
Static task
static1
Behavioral task
behavioral1
Sample
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5
-
Size
829KB
-
MD5
a82a8ffef07b6ba5fcb6e278febe13ab
-
SHA1
d7dfc78d760b93114550deb4b1f142bcace6bf23
-
SHA256
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5
-
SHA512
b86fbf1cbf0ca6b3abd2ed9bd3db4b55bd9486484a82aa71e71d023d8675378b559eecb0ae6845a2cdc1c21b77086d56a163dcd535f145f17ea57eab2258c6a6
-
SSDEEP
12288:2MrWy90R8g7RMrzXq5HKlEPwo+ia6iAjgLDnV6V2JKEILGy9fhsD1T2bBi:kyA8+ISHYEPA6ifnVK1RDs5T2b0
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1