General
-
Target
0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a
-
Size
829KB
-
Sample
230831-lclxmsdh3w
-
MD5
5dc584de4e4d5a3691088f58c6830835
-
SHA1
0ae1e1dedcf9f5f7d2f4add3b83f15d5eb0a5dc2
-
SHA256
0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a
-
SHA512
0df4ace99620d3541928f5c24a3846659ce1d4d194103d0a7043ed983af946463c703aed70e4180f194d435d8d18a906dc8c3eb39a1928bdcacdfd18d9281f37
-
SSDEEP
12288:VMrfy90NSz4tBeykRL9LKgHXcRB1J5sNuoi3+du/HD+58sQc45MPPwDhDy+7/:ayd2LMMjz/K+sQcA4YDh3/
Static task
static1
Behavioral task
behavioral1
Sample
0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a
-
Size
829KB
-
MD5
5dc584de4e4d5a3691088f58c6830835
-
SHA1
0ae1e1dedcf9f5f7d2f4add3b83f15d5eb0a5dc2
-
SHA256
0b81d51d1e2dae904bdb2f755c6525fe717c7211cc4ff6c12a3cec794203070a
-
SHA512
0df4ace99620d3541928f5c24a3846659ce1d4d194103d0a7043ed983af946463c703aed70e4180f194d435d8d18a906dc8c3eb39a1928bdcacdfd18d9281f37
-
SSDEEP
12288:VMrfy90NSz4tBeykRL9LKgHXcRB1J5sNuoi3+du/HD+58sQc45MPPwDhDy+7/:ayd2LMMjz/K+sQcA4YDh3/
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1