General
-
Target
3af696d488d96654371d33ab500f49236f010eb3fdf0bcb66939eec9d1ebd681
-
Size
829KB
-
Sample
230902-fyegssbb71
-
MD5
388227380024ae686bb5f1f7a0669d8b
-
SHA1
7f03d633ad6ef2c94dcba79a4bc0d9ada75ee6b2
-
SHA256
3af696d488d96654371d33ab500f49236f010eb3fdf0bcb66939eec9d1ebd681
-
SHA512
8a48eeabdc3c2a6df3dc40d6257e9131181aec6797c367c6b51a544980838f554330d1a91ad64ca47c1e6c0384f34e56d5944c6c36d79660f678b4b559d30560
-
SSDEEP
12288:jMr8y90wVfe70EqgVVRR7VZQmPT3TOHHFkGn0ilkb7GKWSb739PZiaf7rPDsank5:fyjVf/ELjRnZPjUF6fWCT9PIGQankz1
Static task
static1
Behavioral task
behavioral1
Sample
3af696d488d96654371d33ab500f49236f010eb3fdf0bcb66939eec9d1ebd681.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
3af696d488d96654371d33ab500f49236f010eb3fdf0bcb66939eec9d1ebd681
-
Size
829KB
-
MD5
388227380024ae686bb5f1f7a0669d8b
-
SHA1
7f03d633ad6ef2c94dcba79a4bc0d9ada75ee6b2
-
SHA256
3af696d488d96654371d33ab500f49236f010eb3fdf0bcb66939eec9d1ebd681
-
SHA512
8a48eeabdc3c2a6df3dc40d6257e9131181aec6797c367c6b51a544980838f554330d1a91ad64ca47c1e6c0384f34e56d5944c6c36d79660f678b4b559d30560
-
SSDEEP
12288:jMr8y90wVfe70EqgVVRR7VZQmPT3TOHHFkGn0ilkb7GKWSb739PZiaf7rPDsank5:fyjVf/ELjRnZPjUF6fWCT9PIGQankz1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1