General
-
Target
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9
-
Size
827KB
-
Sample
230902-jf6ecabg49
-
MD5
f370523fe7a107180d54b5ac8b34e8f7
-
SHA1
cb4bdcfa51faa8a9b9c8465df3280fd3206f7990
-
SHA256
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9
-
SHA512
2666e6d9ab95740b6c8f5f9f8e32759096ece98582fe9a4404214583ab22f4f5a87513f286b7ff81a5f8dad88bbbb6b805b8211f71ad3843c88cb7d9061e44fd
-
SSDEEP
24576:LyWJsKTtJ0Tq4N3ZBBJtTFREsef175NSsBi:+WJsjuYJBzhxef13Ss
Static task
static1
Behavioral task
behavioral1
Sample
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9
-
Size
827KB
-
MD5
f370523fe7a107180d54b5ac8b34e8f7
-
SHA1
cb4bdcfa51faa8a9b9c8465df3280fd3206f7990
-
SHA256
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9
-
SHA512
2666e6d9ab95740b6c8f5f9f8e32759096ece98582fe9a4404214583ab22f4f5a87513f286b7ff81a5f8dad88bbbb6b805b8211f71ad3843c88cb7d9061e44fd
-
SSDEEP
24576:LyWJsKTtJ0Tq4N3ZBBJtTFREsef175NSsBi:+WJsjuYJBzhxef13Ss
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1