General
-
Target
2eeb348e45b501b0f2c76b8eeb860f96943fad510751317d7eb523abd25f3de7
-
Size
828KB
-
Sample
230830-satyssfc5z
-
MD5
86b5445aeb97e754d2ec7aa3052fe722
-
SHA1
cc643de005e79820dc89cc8cd1267957f2adf772
-
SHA256
2eeb348e45b501b0f2c76b8eeb860f96943fad510751317d7eb523abd25f3de7
-
SHA512
64f28a855c672eaa4f1c3f25c84f2444659d4e77cc6efc2e984d1f7315b0ca471de7dc6aa157553ecb4c5e7f112027b295bb127bb419054b6ba51b7af8ca0a01
-
SSDEEP
12288:HMrpy90CXLPWbn2J3gbDJjEhBFqKnLHiqei8VnRbbkKjZnYL0/1xw8k:Ky7XL+b2J3axEhbqYp8VnRnnnYLP
Static task
static1
Behavioral task
behavioral1
Sample
2eeb348e45b501b0f2c76b8eeb860f96943fad510751317d7eb523abd25f3de7.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
2eeb348e45b501b0f2c76b8eeb860f96943fad510751317d7eb523abd25f3de7
-
Size
828KB
-
MD5
86b5445aeb97e754d2ec7aa3052fe722
-
SHA1
cc643de005e79820dc89cc8cd1267957f2adf772
-
SHA256
2eeb348e45b501b0f2c76b8eeb860f96943fad510751317d7eb523abd25f3de7
-
SHA512
64f28a855c672eaa4f1c3f25c84f2444659d4e77cc6efc2e984d1f7315b0ca471de7dc6aa157553ecb4c5e7f112027b295bb127bb419054b6ba51b7af8ca0a01
-
SSDEEP
12288:HMrpy90CXLPWbn2J3gbDJjEhBFqKnLHiqei8VnRbbkKjZnYL0/1xw8k:Ky7XL+b2J3axEhbqYp8VnRnnnYLP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1