General
-
Target
JC_0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2
-
Size
931KB
-
Sample
230902-mfeheabg8t
-
MD5
86011e726e71086ce150fa50b17b65a7
-
SHA1
7d2a727c55ed6a15119a38193b3ec18ca3d00c45
-
SHA256
0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2
-
SHA512
f715313ae164ef7d4d071eaea27844e348a8756bab9fd44d3706bc323d0754a0a16903aacfdc62fb7515c30bf92840a0481525137160b90e796bcf619a72a5a4
-
SSDEEP
24576:+yvSm5gETARmun2XWoshTFEHDNJ1v7yx21XbBwJ:NvSRK9bpv7yY1S
Static task
static1
Behavioral task
behavioral1
Sample
JC_0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2
-
Size
931KB
-
MD5
86011e726e71086ce150fa50b17b65a7
-
SHA1
7d2a727c55ed6a15119a38193b3ec18ca3d00c45
-
SHA256
0594aa74bb68aa51eb78a7720b6d225b16b52884458542d2c258cb7bea7c4db2
-
SHA512
f715313ae164ef7d4d071eaea27844e348a8756bab9fd44d3706bc323d0754a0a16903aacfdc62fb7515c30bf92840a0481525137160b90e796bcf619a72a5a4
-
SSDEEP
24576:+yvSm5gETARmun2XWoshTFEHDNJ1v7yx21XbBwJ:NvSRK9bpv7yY1S
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1