General
-
Target
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37
-
Size
825KB
-
Sample
230827-lnxhhsaf9w
-
MD5
2b7c2817d7034f340bc53372b7664f3d
-
SHA1
fcd32b289fb7307df1a21ded630d46974e6430e3
-
SHA256
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37
-
SHA512
5dc1a9ca4fbb0c1f6b4ffb9bcd8e0874cd1760f067542b1df9044387a1454302c7cd46816dd7b9fc3f84febe9601053d73af822f59ec298db88f7b37eadc13ba
-
SSDEEP
12288:jMrMy90EpVroyDEOkBDVIyRJ55ECb/qJETRaydkBKH/LE59lgKTqJG7:7yjpuyDEO6DlUe/qedkUqso
Static task
static1
Behavioral task
behavioral1
Sample
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37
-
Size
825KB
-
MD5
2b7c2817d7034f340bc53372b7664f3d
-
SHA1
fcd32b289fb7307df1a21ded630d46974e6430e3
-
SHA256
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37
-
SHA512
5dc1a9ca4fbb0c1f6b4ffb9bcd8e0874cd1760f067542b1df9044387a1454302c7cd46816dd7b9fc3f84febe9601053d73af822f59ec298db88f7b37eadc13ba
-
SSDEEP
12288:jMrMy90EpVroyDEOkBDVIyRJ55ECb/qJETRaydkBKH/LE59lgKTqJG7:7yjpuyDEO6DlUe/qedkUqso
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1