General
-
Target
JC_904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96
-
Size
930KB
-
Sample
230902-nya4dach28
-
MD5
b00da9eee1f06c79185beea911fad1cd
-
SHA1
eef27e1f32231ec59cc5775a9bd5e31356003a6c
-
SHA256
904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96
-
SHA512
f1d8078a68910c83b81dce31edc076fd96f1f9c75bd10d48a04e798e5f518d90d56ea3b1bf562ff82efa0082dedf4093156f1adc66255f0aa22984e36a53b70a
-
SSDEEP
12288:TMr+y90beilREKJFrooIKakOriy24yReFB16QPClWhHfRx/ts9CM1MvM1UJ9isc:Ryu/RVFBISjlRE1/Pz/bYMvMObw
Static task
static1
Behavioral task
behavioral1
Sample
JC_904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96
-
Size
930KB
-
MD5
b00da9eee1f06c79185beea911fad1cd
-
SHA1
eef27e1f32231ec59cc5775a9bd5e31356003a6c
-
SHA256
904af970aae5da3974353bb4a19bee875af4022f68bd0f3d7c2b406065024e96
-
SHA512
f1d8078a68910c83b81dce31edc076fd96f1f9c75bd10d48a04e798e5f518d90d56ea3b1bf562ff82efa0082dedf4093156f1adc66255f0aa22984e36a53b70a
-
SSDEEP
12288:TMr+y90beilREKJFrooIKakOriy24yReFB16QPClWhHfRx/ts9CM1MvM1UJ9isc:Ryu/RVFBISjlRE1/Pz/bYMvMObw
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1