General
-
Target
867f753a23b4be52c44bac5948bced3c83f8aee80451946d01f010611bd70005
-
Size
829KB
-
Sample
230827-nlnhyabb61
-
MD5
043f7a46944fc97d005a55f8da2f07c9
-
SHA1
451567838e897027e8baf37e917f2c8f831a1946
-
SHA256
867f753a23b4be52c44bac5948bced3c83f8aee80451946d01f010611bd70005
-
SHA512
c5f5eb35695f8ed96e8169b09fe4d8713c54d92f7e605338bc095761b6c628fe4b8075087a9db976980250307dbfddabc74a0fe6a0685dcd157d033698c0c614
-
SSDEEP
12288:ZMr+y90QW8mONKKeviDMmmKpJ5MyUQe/VfJWWvFVDdulXJ+AwQD+TSnSDz:zyDBNzeviqYJ5MbJxLk/+AISnYz
Static task
static1
Behavioral task
behavioral1
Sample
867f753a23b4be52c44bac5948bced3c83f8aee80451946d01f010611bd70005.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Targets
-
-
Target
867f753a23b4be52c44bac5948bced3c83f8aee80451946d01f010611bd70005
-
Size
829KB
-
MD5
043f7a46944fc97d005a55f8da2f07c9
-
SHA1
451567838e897027e8baf37e917f2c8f831a1946
-
SHA256
867f753a23b4be52c44bac5948bced3c83f8aee80451946d01f010611bd70005
-
SHA512
c5f5eb35695f8ed96e8169b09fe4d8713c54d92f7e605338bc095761b6c628fe4b8075087a9db976980250307dbfddabc74a0fe6a0685dcd157d033698c0c614
-
SSDEEP
12288:ZMr+y90QW8mONKKeviDMmmKpJ5MyUQe/VfJWWvFVDdulXJ+AwQD+TSnSDz:zyDBNzeviqYJ5MbJxLk/+AISnYz
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1