General
-
Target
24745c5fe51f670038bcf432578656c445f2466e918317f52903ac11a6ea5c76
-
Size
828KB
-
Sample
230902-msj9escc96
-
MD5
973ad9918e5366ce0d09f3bd601ec501
-
SHA1
0363bf8d7b3d84fccc54d8597b2466e0f5a0d972
-
SHA256
24745c5fe51f670038bcf432578656c445f2466e918317f52903ac11a6ea5c76
-
SHA512
abe62fec24d69d8be70122c987c18fe7bd75ba61d607ddf7aa3b38767b8782e2d9b3da1d6f3107855832f6e94d35c7d1b05a6bfbaec145910f0042b1823bbfff
-
SSDEEP
24576:qyzdjnB433BJZ+U3bFd6V5RHH68ZATksqnyH:xpjnyhDxQ59pATk
Static task
static1
Behavioral task
behavioral1
Sample
24745c5fe51f670038bcf432578656c445f2466e918317f52903ac11a6ea5c76.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Targets
-
-
Target
24745c5fe51f670038bcf432578656c445f2466e918317f52903ac11a6ea5c76
-
Size
828KB
-
MD5
973ad9918e5366ce0d09f3bd601ec501
-
SHA1
0363bf8d7b3d84fccc54d8597b2466e0f5a0d972
-
SHA256
24745c5fe51f670038bcf432578656c445f2466e918317f52903ac11a6ea5c76
-
SHA512
abe62fec24d69d8be70122c987c18fe7bd75ba61d607ddf7aa3b38767b8782e2d9b3da1d6f3107855832f6e94d35c7d1b05a6bfbaec145910f0042b1823bbfff
-
SSDEEP
24576:qyzdjnB433BJZ+U3bFd6V5RHH68ZATksqnyH:xpjnyhDxQ59pATk
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1