General
-
Target
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10_JC.exe
-
Size
828KB
-
Sample
230901-s59yhaff4y
-
MD5
890a181d01baac191ea246bf858af534
-
SHA1
b6d1f501da5016d0820ce9a51c2b7ca8dcecc129
-
SHA256
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10
-
SHA512
1330d14daa93bc66168b85bbe178cd144f9a5d8a6eb43f0574bfa3cf9471acc45e13cc3a51961c1722543eb2ae1c5b1f9c92087dc99fcdad136ca2a0e73c9cc5
-
SSDEEP
12288:VMrFy90Wl0q0Yp+5Dce054OmQV9szkpke2WAs2Sb137HrF0X5pzAUBPxhiOPMe:oyu5DceNOtzYFey8FHrS5pEUBPLiPe
Static task
static1
Behavioral task
behavioral1
Sample
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10_JC.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Targets
-
-
Target
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10_JC.exe
-
Size
828KB
-
MD5
890a181d01baac191ea246bf858af534
-
SHA1
b6d1f501da5016d0820ce9a51c2b7ca8dcecc129
-
SHA256
440a01923b0b54849e0c62042a92649e8ee8dc2fc5200abc756a982447efef10
-
SHA512
1330d14daa93bc66168b85bbe178cd144f9a5d8a6eb43f0574bfa3cf9471acc45e13cc3a51961c1722543eb2ae1c5b1f9c92087dc99fcdad136ca2a0e73c9cc5
-
SSDEEP
12288:VMrFy90Wl0q0Yp+5Dce054OmQV9szkpke2WAs2Sb137HrF0X5pzAUBPxhiOPMe:oyu5DceNOtzYFey8FHrS5pEUBPLiPe
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1