General
-
Target
3e3f76d0eb0880a6b773b9866e1fa75e1c9d2336a7b57794e6bdce928f38c462
-
Size
829KB
-
Sample
230901-1yspmsaa9z
-
MD5
810ba4ba9635c1cbcd6dc5267f7831d3
-
SHA1
3890a500147628e460a288174f9578a4a8351e14
-
SHA256
3e3f76d0eb0880a6b773b9866e1fa75e1c9d2336a7b57794e6bdce928f38c462
-
SHA512
6a664017d9ef3162795d234bae7e8182891095ac0cdca4500b46d5011b0e6913e21a6c96de77ab773fe2271014badbd2ace2034bc288c8916cd7bdf3a1f9d5a8
-
SSDEEP
12288:qMrVy90q/vgtd428pMbxmrTytvh/ofDO/IUGB11E/1fDKEc1hd6sV4MgX:nyFHgtGFpM9tJA61GB/s1fDcV4XX
Static task
static1
Behavioral task
behavioral1
Sample
3e3f76d0eb0880a6b773b9866e1fa75e1c9d2336a7b57794e6bdce928f38c462.exe
Resource
win10-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
3e3f76d0eb0880a6b773b9866e1fa75e1c9d2336a7b57794e6bdce928f38c462
-
Size
829KB
-
MD5
810ba4ba9635c1cbcd6dc5267f7831d3
-
SHA1
3890a500147628e460a288174f9578a4a8351e14
-
SHA256
3e3f76d0eb0880a6b773b9866e1fa75e1c9d2336a7b57794e6bdce928f38c462
-
SHA512
6a664017d9ef3162795d234bae7e8182891095ac0cdca4500b46d5011b0e6913e21a6c96de77ab773fe2271014badbd2ace2034bc288c8916cd7bdf3a1f9d5a8
-
SSDEEP
12288:qMrVy90q/vgtd428pMbxmrTytvh/ofDO/IUGB11E/1fDKEc1hd6sV4MgX:nyFHgtGFpM9tJA61GB/s1fDcV4XX
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1