General
-
Target
e26a7d14e83e058c35a6efa1c23217d4719d6a838c2eaba822f220e5fb73ddd1
-
Size
829KB
-
Sample
230901-nff7nsed3t
-
MD5
18af7812ebacd59d53a797db44f3b5a0
-
SHA1
2fe515d3d80e2a4d4c506d4738ce5a86bba495a0
-
SHA256
e26a7d14e83e058c35a6efa1c23217d4719d6a838c2eaba822f220e5fb73ddd1
-
SHA512
b2f26b120d977b2330bc54657978d3cef09805235986f1f0bec4ba4303d13fbbf85a22b4dafa7ad04a6452035583fe441b82fed07446e527dabffa28eeb5b663
-
SSDEEP
12288:EMrhy9068Fp4+XeZr133Fhhvg5avU9A6QWuReZkKHBMnUESp+Ghp7STvysGNkbMY:1yoU+XeZ7hhlcWtWt35p7grF
Static task
static1
Behavioral task
behavioral1
Sample
e26a7d14e83e058c35a6efa1c23217d4719d6a838c2eaba822f220e5fb73ddd1.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Targets
-
-
Target
e26a7d14e83e058c35a6efa1c23217d4719d6a838c2eaba822f220e5fb73ddd1
-
Size
829KB
-
MD5
18af7812ebacd59d53a797db44f3b5a0
-
SHA1
2fe515d3d80e2a4d4c506d4738ce5a86bba495a0
-
SHA256
e26a7d14e83e058c35a6efa1c23217d4719d6a838c2eaba822f220e5fb73ddd1
-
SHA512
b2f26b120d977b2330bc54657978d3cef09805235986f1f0bec4ba4303d13fbbf85a22b4dafa7ad04a6452035583fe441b82fed07446e527dabffa28eeb5b663
-
SSDEEP
12288:EMrhy9068Fp4+XeZr133Fhhvg5avU9A6QWuReZkKHBMnUESp+Ghp7STvysGNkbMY:1yoU+XeZ7hhlcWtWt35p7grF
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1