General
-
Target
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9
-
Size
930KB
-
Sample
230827-njmtmahc63
-
MD5
69d4b134b45ae8c32164982f0a0a0250
-
SHA1
a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa
-
SHA256
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9
-
SHA512
da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24
-
SSDEEP
24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw
Static task
static1
Behavioral task
behavioral1
Sample
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe
Resource
win10v2004-20230824-en
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9
-
Size
930KB
-
MD5
69d4b134b45ae8c32164982f0a0a0250
-
SHA1
a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa
-
SHA256
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9
-
SHA512
da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24
-
SSDEEP
24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1