General
-
Target
JC_1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4
-
Size
830KB
-
Sample
230902-mm98nabh81
-
MD5
54a027797db3cf418309c7d316263a3e
-
SHA1
c2b7b982aab869ead87e851b6932218ef17ea7ba
-
SHA256
1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4
-
SHA512
60f329794016f7d30012f678a6052fa0fab3cd8e94303b9f0f3a3050baf49bfe2e587a89c445e98b5f00dba4ce99578557675c59e7f3c4eaa0aab9321c118efe
-
SSDEEP
12288:jMrPy90vT97KUVQrEiMuIWxueUXVLvFgu7yRAYvrDtKsUOu5VdUbPidtm07ILo5I:Yy8sYiMuIkLUXldyzt+5uPot0LHdT
Static task
static1
Behavioral task
behavioral1
Sample
JC_1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
domka
77.91.124.82:19071
-
auth_value
74e19436acac85e44d691aebcc617529
Targets
-
-
Target
JC_1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4
-
Size
830KB
-
MD5
54a027797db3cf418309c7d316263a3e
-
SHA1
c2b7b982aab869ead87e851b6932218ef17ea7ba
-
SHA256
1498cea6a80638cef6b65a1281a329ccdd09ff6f17763538dba20c56e5e55db4
-
SHA512
60f329794016f7d30012f678a6052fa0fab3cd8e94303b9f0f3a3050baf49bfe2e587a89c445e98b5f00dba4ce99578557675c59e7f3c4eaa0aab9321c118efe
-
SSDEEP
12288:jMrPy90vT97KUVQrEiMuIWxueUXVLvFgu7yRAYvrDtKsUOu5VdUbPidtm07ILo5I:Yy8sYiMuIkLUXldyzt+5uPot0LHdT
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1