General
-
Target
JC_a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93
-
Size
830KB
-
Sample
230902-n9mljsda59
-
MD5
90b99fe80cbbd5c76c10ea9a2b174a1d
-
SHA1
23b9672882d4401abe0c957ee84220dd26810e03
-
SHA256
a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93
-
SHA512
c6ae3e4c41e62b7d8c794c628cca840c755edd06bf9e64c54e13617dbb22ae167e1d292308380728c809a3b3c1cd35877531eb5924411620ffae38d0c7e29bd1
-
SSDEEP
24576:qyqKuvZh7do0Uv/4fLSPue2MnTh7qYr/m6j:xq7vVoJ/4jaNWAm
Static task
static1
Behavioral task
behavioral1
Sample
JC_a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93
-
Size
830KB
-
MD5
90b99fe80cbbd5c76c10ea9a2b174a1d
-
SHA1
23b9672882d4401abe0c957ee84220dd26810e03
-
SHA256
a5afc56002cedd17d4f632267e602aa0a47ea02f93414e03e88d25dbfc4f4e93
-
SHA512
c6ae3e4c41e62b7d8c794c628cca840c755edd06bf9e64c54e13617dbb22ae167e1d292308380728c809a3b3c1cd35877531eb5924411620ffae38d0c7e29bd1
-
SSDEEP
24576:qyqKuvZh7do0Uv/4fLSPue2MnTh7qYr/m6j:xq7vVoJ/4jaNWAm
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1