General
-
Target
5274d2b6bc174d6297ee672b62474a04af2fa35e6f6790386cb74daace5c68ac
-
Size
829KB
-
Sample
230901-kqpp1seb27
-
MD5
0cf1964913e6821e8bda4805bbf4788a
-
SHA1
5b43e940875fdab8ce25d84a04c26b9ecffbdb13
-
SHA256
5274d2b6bc174d6297ee672b62474a04af2fa35e6f6790386cb74daace5c68ac
-
SHA512
26e25065744e63a72956675cd7b9215c2ff4fb39fd3dd74dab999a28506dc3485169e4f3b853c9a7c3ea57e7a5cea4460fd3f017d5ef8341b71d0b1dcc371f14
-
SSDEEP
12288:PMrXy902PI8I/Ng1KE5KldUutjoZgvJFYgbALYW1eSD6jyELdspCpLF:UyBI9/EKptjoOvYOwYEebym5F
Static task
static1
Behavioral task
behavioral1
Sample
5274d2b6bc174d6297ee672b62474a04af2fa35e6f6790386cb74daace5c68ac.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Targets
-
-
Target
5274d2b6bc174d6297ee672b62474a04af2fa35e6f6790386cb74daace5c68ac
-
Size
829KB
-
MD5
0cf1964913e6821e8bda4805bbf4788a
-
SHA1
5b43e940875fdab8ce25d84a04c26b9ecffbdb13
-
SHA256
5274d2b6bc174d6297ee672b62474a04af2fa35e6f6790386cb74daace5c68ac
-
SHA512
26e25065744e63a72956675cd7b9215c2ff4fb39fd3dd74dab999a28506dc3485169e4f3b853c9a7c3ea57e7a5cea4460fd3f017d5ef8341b71d0b1dcc371f14
-
SSDEEP
12288:PMrXy902PI8I/Ng1KE5KldUutjoZgvJFYgbALYW1eSD6jyELdspCpLF:UyBI9/EKptjoOvYOwYEebym5F
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1