General
-
Target
9cfc92fd12351dd80d6637b9a8407e263f1f8239ce94877fa6947d000c9e2a43
-
Size
829KB
-
Sample
230828-2aw8labd7z
-
MD5
c3b6eec3a86933bfb3e05d116631abbf
-
SHA1
713c7c7ac552b59e41abb45c325aad09dac9381b
-
SHA256
9cfc92fd12351dd80d6637b9a8407e263f1f8239ce94877fa6947d000c9e2a43
-
SHA512
b499267ae5d80e278044aaf76cacb684ba60baaa1c350c78fa4689c9b6f82cc74a034613dcebfc663db30050d136ba03897c428dc38734dc9a33b87dfdc3b14a
-
SSDEEP
24576:My6n39z317/thu9IX/tL1FlbM9ZyVh5dgS:76n3V1Cm11FSZw5d
Static task
static1
Behavioral task
behavioral1
Sample
9cfc92fd12351dd80d6637b9a8407e263f1f8239ce94877fa6947d000c9e2a43.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Targets
-
-
Target
9cfc92fd12351dd80d6637b9a8407e263f1f8239ce94877fa6947d000c9e2a43
-
Size
829KB
-
MD5
c3b6eec3a86933bfb3e05d116631abbf
-
SHA1
713c7c7ac552b59e41abb45c325aad09dac9381b
-
SHA256
9cfc92fd12351dd80d6637b9a8407e263f1f8239ce94877fa6947d000c9e2a43
-
SHA512
b499267ae5d80e278044aaf76cacb684ba60baaa1c350c78fa4689c9b6f82cc74a034613dcebfc663db30050d136ba03897c428dc38734dc9a33b87dfdc3b14a
-
SSDEEP
24576:My6n39z317/thu9IX/tL1FlbM9ZyVh5dgS:76n3V1Cm11FSZw5d
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1