General
-
Target
333adb371c659cce8a15e9d64a7549cd3ee1387a330ce78d87f1fa63a3fafb38
-
Size
828KB
-
Sample
230828-sa6mlabh32
-
MD5
30b852c54c762daa3080e4b7458a2033
-
SHA1
37d1c1f11a1effe0bcd411d06ab3ad1d3620503a
-
SHA256
333adb371c659cce8a15e9d64a7549cd3ee1387a330ce78d87f1fa63a3fafb38
-
SHA512
06f56cf062acef58a5fda55d1b088147af93588ede16ae56d763f80b317b156a8a8e586a15413bd1e23e38dd40c4dd249b8862c67096e7574e817479ec6f37dd
-
SSDEEP
24576:EpyLh6bJdCqaxG0p/Y2e7rsdOyOEZx0dy0Q:EcLwbJgzG0p/Yt7IUyOv
Static task
static1
Behavioral task
behavioral1
Sample
333adb371c659cce8a15e9d64a7549cd3ee1387a330ce78d87f1fa63a3fafb38.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Targets
-
-
Target
333adb371c659cce8a15e9d64a7549cd3ee1387a330ce78d87f1fa63a3fafb38
-
Size
828KB
-
MD5
30b852c54c762daa3080e4b7458a2033
-
SHA1
37d1c1f11a1effe0bcd411d06ab3ad1d3620503a
-
SHA256
333adb371c659cce8a15e9d64a7549cd3ee1387a330ce78d87f1fa63a3fafb38
-
SHA512
06f56cf062acef58a5fda55d1b088147af93588ede16ae56d763f80b317b156a8a8e586a15413bd1e23e38dd40c4dd249b8862c67096e7574e817479ec6f37dd
-
SSDEEP
24576:EpyLh6bJdCqaxG0p/Y2e7rsdOyOEZx0dy0Q:EcLwbJgzG0p/Yt7IUyOv
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1