General
-
Target
ef0f222217f4b83988df688f49728aef5c126e35411909180a395050a04f8dde
-
Size
827KB
-
Sample
230831-eg7atacd81
-
MD5
221b188cd8088ae5c9b01594be8c2801
-
SHA1
c05e9dc7f5e1e74e0b34fa07de759b018d64a985
-
SHA256
ef0f222217f4b83988df688f49728aef5c126e35411909180a395050a04f8dde
-
SHA512
49d63a0d9d26cc07ffbec2707032cd2bd712a9f5af92b686f6c670c97e053b3977409c3a08d03aa8e37b1a2213c90daf9530d9d4ecd5095d5f1656b7cea46144
-
SSDEEP
24576:JyiUcIk57J5/bBZzJVP12SM2gxzcDPOzI:8i39xbBZHPxMwDPOz
Static task
static1
Behavioral task
behavioral1
Sample
ef0f222217f4b83988df688f49728aef5c126e35411909180a395050a04f8dde.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
ef0f222217f4b83988df688f49728aef5c126e35411909180a395050a04f8dde
-
Size
827KB
-
MD5
221b188cd8088ae5c9b01594be8c2801
-
SHA1
c05e9dc7f5e1e74e0b34fa07de759b018d64a985
-
SHA256
ef0f222217f4b83988df688f49728aef5c126e35411909180a395050a04f8dde
-
SHA512
49d63a0d9d26cc07ffbec2707032cd2bd712a9f5af92b686f6c670c97e053b3977409c3a08d03aa8e37b1a2213c90daf9530d9d4ecd5095d5f1656b7cea46144
-
SSDEEP
24576:JyiUcIk57J5/bBZzJVP12SM2gxzcDPOzI:8i39xbBZHPxMwDPOz
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1