General
-
Target
JC_3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184
-
Size
829KB
-
Sample
230901-xh78lshb66
-
MD5
1f9671f636cc9e2064ee731f66064894
-
SHA1
8eabba78bc1283fdeec7130b0123fe4811848fd2
-
SHA256
3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184
-
SHA512
4a0feb2d488fcefe27fb2d469531348c5a294107c5dd6eeb8687c0595be595b98c89f0cefcf193efb41fd65681214c0b4c9b369b68ca2db7f87ccf085d4bd920
-
SSDEEP
12288:KMrny90MB8YaH4XVj56omZSqvU/DWhdPIkYY/idSz9Hoc0VtjmG9/AvVDReCWG:Ny7/Ggqc/DWhC/YtopPP4NDReCWG
Static task
static1
Behavioral task
behavioral1
Sample
JC_3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
domka
77.91.124.82:19071
-
auth_value
74e19436acac85e44d691aebcc617529
Targets
-
-
Target
JC_3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184
-
Size
829KB
-
MD5
1f9671f636cc9e2064ee731f66064894
-
SHA1
8eabba78bc1283fdeec7130b0123fe4811848fd2
-
SHA256
3475ef121da35d0123bb2c1d57a65dc678ab3f2cc12b68ace9542eba7eb99184
-
SHA512
4a0feb2d488fcefe27fb2d469531348c5a294107c5dd6eeb8687c0595be595b98c89f0cefcf193efb41fd65681214c0b4c9b369b68ca2db7f87ccf085d4bd920
-
SSDEEP
12288:KMrny90MB8YaH4XVj56omZSqvU/DWhdPIkYY/idSz9Hoc0VtjmG9/AvVDReCWG:Ny7/Ggqc/DWhC/YtopPP4NDReCWG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1