General
-
Target
JC_40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136
-
Size
830KB
-
Sample
230902-m5cecace24
-
MD5
e764248433785856f58dab1d5016e2a9
-
SHA1
16f19258b419d1af34af4827b5739ffbf37c0cd4
-
SHA256
40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136
-
SHA512
34508b8b133f54774146e8fc07867491d9b137266ad7153ca3f2132011e479ab99ffd4420406d24efe899ec4a8a1a60fb895610e46b6c65b680bcdcf9b85c9d9
-
SSDEEP
12288:4MrJy90LbB6HsJfF8aUK6A7d6bFG8zr7/NmDn7JX20greJG+GKBYWHuBTe:RysfS/zlbFGYr50ueJOKBYcQy
Static task
static1
Behavioral task
behavioral1
Sample
JC_40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136
-
Size
830KB
-
MD5
e764248433785856f58dab1d5016e2a9
-
SHA1
16f19258b419d1af34af4827b5739ffbf37c0cd4
-
SHA256
40234bcc2de1e3c0fbe00c768ae7aab55960ad6314468ec4b94da09187f25136
-
SHA512
34508b8b133f54774146e8fc07867491d9b137266ad7153ca3f2132011e479ab99ffd4420406d24efe899ec4a8a1a60fb895610e46b6c65b680bcdcf9b85c9d9
-
SSDEEP
12288:4MrJy90LbB6HsJfF8aUK6A7d6bFG8zr7/NmDn7JX20greJG+GKBYWHuBTe:RysfS/zlbFGYr50ueJOKBYcQy
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1