General
-
Target
JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3
-
Size
829KB
-
Sample
230901-ynrcqahd31
-
MD5
3d8f7a2d8cc160f611070083fe80ad48
-
SHA1
9f90315a136107750102b4791c09ff408d32598a
-
SHA256
f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3
-
SHA512
cf9b68014da8836b419ef1d0ff173507af025f02df4a4ebcc2a9bd5e2cd6f34d88ac68db9afd4893607cc59e584e3930e72812b5a89c663b226acd6b15b1905c
-
SSDEEP
12288:nMr4y901GqukWlRlCgfbrUY3PPehLwp+37yeqEWC1:HywGqu5PzN61GeqPU
Static task
static1
Behavioral task
behavioral1
Sample
JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Targets
-
-
Target
JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3
-
Size
829KB
-
MD5
3d8f7a2d8cc160f611070083fe80ad48
-
SHA1
9f90315a136107750102b4791c09ff408d32598a
-
SHA256
f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3
-
SHA512
cf9b68014da8836b419ef1d0ff173507af025f02df4a4ebcc2a9bd5e2cd6f34d88ac68db9afd4893607cc59e584e3930e72812b5a89c663b226acd6b15b1905c
-
SSDEEP
12288:nMr4y901GqukWlRlCgfbrUY3PPehLwp+37yeqEWC1:HywGqu5PzN61GeqPU
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1