General
-
Target
4c0edd4f35f487de8a76235f78d9f039fa3a5893ecb68c6af691296136de6df4
-
Size
821KB
-
Sample
230901-dbxnracc87
-
MD5
1d4cd5f33a5934c1dd82174e3fca1a8e
-
SHA1
f0bdb022a3b7cd2c453611cafeaccba8bc89c51f
-
SHA256
4c0edd4f35f487de8a76235f78d9f039fa3a5893ecb68c6af691296136de6df4
-
SHA512
aa25723e9aa1a3fc3efdb43491782949e76393848119ada285eea4c9268e5e34ee30fa46e2dbc2019ae959752065903d0f26a42eecb2942284b5cabbb34f95c8
-
SSDEEP
24576:PyOM/hcBaNq/ybFzdN1cvdRfj9i6ogPo+t00+:aOK9zz1Utj9TML
Static task
static1
Behavioral task
behavioral1
Sample
4c0edd4f35f487de8a76235f78d9f039fa3a5893ecb68c6af691296136de6df4.exe
Resource
win10-20230831-en
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Targets
-
-
Target
4c0edd4f35f487de8a76235f78d9f039fa3a5893ecb68c6af691296136de6df4
-
Size
821KB
-
MD5
1d4cd5f33a5934c1dd82174e3fca1a8e
-
SHA1
f0bdb022a3b7cd2c453611cafeaccba8bc89c51f
-
SHA256
4c0edd4f35f487de8a76235f78d9f039fa3a5893ecb68c6af691296136de6df4
-
SHA512
aa25723e9aa1a3fc3efdb43491782949e76393848119ada285eea4c9268e5e34ee30fa46e2dbc2019ae959752065903d0f26a42eecb2942284b5cabbb34f95c8
-
SSDEEP
24576:PyOM/hcBaNq/ybFzdN1cvdRfj9i6ogPo+t00+:aOK9zz1Utj9TML
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1