General
-
Target
db0973d7fb260f66d09ceedbd10cd43cc93380c2280c79d1ed0b396217e4c840
-
Size
828KB
-
Sample
230830-xmw15saa66
-
MD5
96781292f0cb5dd9e0fcc72c736a777c
-
SHA1
d375ba67b04d02fefb50219c00a73a645039fe97
-
SHA256
db0973d7fb260f66d09ceedbd10cd43cc93380c2280c79d1ed0b396217e4c840
-
SHA512
ea516f381decdcc537c13f4669f5f47d8fd11fd562fe965ac7b9ca0059e966de552983c081a1b25113f480a76c5c8f3b6356a5e07d78b9ec28ffa107157b00e2
-
SSDEEP
24576:eyB/9LTtIRQBL9I4ZiQ0nH1ugDRGj1AC6mIHDhyx97ObYoHXur:tVvAEL9sQdWXHUx9KD
Static task
static1
Behavioral task
behavioral1
Sample
db0973d7fb260f66d09ceedbd10cd43cc93380c2280c79d1ed0b396217e4c840.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
db0973d7fb260f66d09ceedbd10cd43cc93380c2280c79d1ed0b396217e4c840
-
Size
828KB
-
MD5
96781292f0cb5dd9e0fcc72c736a777c
-
SHA1
d375ba67b04d02fefb50219c00a73a645039fe97
-
SHA256
db0973d7fb260f66d09ceedbd10cd43cc93380c2280c79d1ed0b396217e4c840
-
SHA512
ea516f381decdcc537c13f4669f5f47d8fd11fd562fe965ac7b9ca0059e966de552983c081a1b25113f480a76c5c8f3b6356a5e07d78b9ec28ffa107157b00e2
-
SSDEEP
24576:eyB/9LTtIRQBL9I4ZiQ0nH1ugDRGj1AC6mIHDhyx97ObYoHXur:tVvAEL9sQdWXHUx9KD
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1