General
-
Target
e2e0e65353db80aa3da1aca2fe9337c993b1f7c7d3c0c0e7fbba87b3f9ee719b
-
Size
829KB
-
Sample
230829-s1b6nsgd81
-
MD5
a623a2ce98687b09744886fb1da80afe
-
SHA1
f72d739892bc4ec21341c443a285c5b5cae39206
-
SHA256
e2e0e65353db80aa3da1aca2fe9337c993b1f7c7d3c0c0e7fbba87b3f9ee719b
-
SHA512
14ffe3e7349ba4d4543d320725cf81e3702aa844e6d7057e6e7450f2ced0d0c43a685165aa3dfdf6957f06fdab770af0866ea9a5a7d2f1641bb0c9c9a90175b6
-
SSDEEP
24576:NysCK4DOvGGpMHA/B4yUlwxLzvqkvdObvKKFX:oPL6MHAZ4vYFObic
Static task
static1
Behavioral task
behavioral1
Sample
e2e0e65353db80aa3da1aca2fe9337c993b1f7c7d3c0c0e7fbba87b3f9ee719b.exe
Resource
win10v2004-20230824-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
e2e0e65353db80aa3da1aca2fe9337c993b1f7c7d3c0c0e7fbba87b3f9ee719b
-
Size
829KB
-
MD5
a623a2ce98687b09744886fb1da80afe
-
SHA1
f72d739892bc4ec21341c443a285c5b5cae39206
-
SHA256
e2e0e65353db80aa3da1aca2fe9337c993b1f7c7d3c0c0e7fbba87b3f9ee719b
-
SHA512
14ffe3e7349ba4d4543d320725cf81e3702aa844e6d7057e6e7450f2ced0d0c43a685165aa3dfdf6957f06fdab770af0866ea9a5a7d2f1641bb0c9c9a90175b6
-
SSDEEP
24576:NysCK4DOvGGpMHA/B4yUlwxLzvqkvdObvKKFX:oPL6MHAZ4vYFObic
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1