General
-
Target
a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3
-
Size
930KB
-
Sample
230827-hx8elahh4v
-
MD5
e5adb53381562c13751bc596ca473633
-
SHA1
3e6981b6e30b9d1dc32073b2adef7c38bb583615
-
SHA256
a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3
-
SHA512
f4fed1910cacd0285d406ef664c5c47c095a0ced6c0e1126369f2de5295310e2f870e024c1456981206654027671f8d4ebead8dbcfef728a870fb4755698fc02
-
SSDEEP
24576:xyuCGPd9z0OYppBp90538PCUlpI8q+7GJQ2T:kuCGPd9zKdH05cDZn7kQ2
Static task
static1
Behavioral task
behavioral1
Sample
a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3
-
Size
930KB
-
MD5
e5adb53381562c13751bc596ca473633
-
SHA1
3e6981b6e30b9d1dc32073b2adef7c38bb583615
-
SHA256
a5c7f89f6956e8121ed83c06f5d04d2c5a2f7c470448a3f0b72ed752b2b5cec3
-
SHA512
f4fed1910cacd0285d406ef664c5c47c095a0ced6c0e1126369f2de5295310e2f870e024c1456981206654027671f8d4ebead8dbcfef728a870fb4755698fc02
-
SSDEEP
24576:xyuCGPd9z0OYppBp90538PCUlpI8q+7GJQ2T:kuCGPd9zKdH05cDZn7kQ2
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1