General
-
Target
abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a
-
Size
824KB
-
Sample
230902-kchpjsbe6w
-
MD5
400cffd98f73df288e91270fa8514879
-
SHA1
f4820a2ede6d1e0b26868d463868a1809a237eba
-
SHA256
abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a
-
SHA512
50632be8107ce869df3375b81971d2f07cdacbd985174abca980028c1001bb74b958d26edd3d6a9b129c51fa2e8ccc38f92f548a849bad927a7cff15bb177363
-
SSDEEP
12288:UMrPy90OdCdv/KtfiElZmY/FAMtXKAC/msR+yJgrurL9WZ3mljMMNuONKI51SwEE:Ly8nO9AG6lcCgru3+e7uONKat
Static task
static1
Behavioral task
behavioral1
Sample
abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a.exe
Resource
win10-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a
-
Size
824KB
-
MD5
400cffd98f73df288e91270fa8514879
-
SHA1
f4820a2ede6d1e0b26868d463868a1809a237eba
-
SHA256
abb4679b7673b3fc704f66f9d035b3e000988e5cffb458714d71e1422110be1a
-
SHA512
50632be8107ce869df3375b81971d2f07cdacbd985174abca980028c1001bb74b958d26edd3d6a9b129c51fa2e8ccc38f92f548a849bad927a7cff15bb177363
-
SSDEEP
12288:UMrPy90OdCdv/KtfiElZmY/FAMtXKAC/msR+yJgrurL9WZ3mljMMNuONKI51SwEE:Ly8nO9AG6lcCgru3+e7uONKat
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1