General
-
Target
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029_JC.exe
-
Size
829KB
-
Sample
230902-p1pj8adb21
-
MD5
fd9bc3308e0bc8cb74950961ba7998a1
-
SHA1
cd4c1262df956f0a7dc9d98b96aa5367b8f9003d
-
SHA256
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029
-
SHA512
c41130467ba9b467f00798783c91e37d26f3c28e743ada5b725f0c6aea1fe841e9047acf04e57cebe739e5defdf9150ce641e49f1e2d7d09abd0a1e1d17a81f1
-
SSDEEP
12288:ZMrly90hMOBS+UCCPcrM0JNCL20ThdSVVFbXtdWwNbSezqnnCM6LJw:MySlS+UAM0JExTOZDtdhtzaClw
Static task
static1
Behavioral task
behavioral1
Sample
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029_JC.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Targets
-
-
Target
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029_JC.exe
-
Size
829KB
-
MD5
fd9bc3308e0bc8cb74950961ba7998a1
-
SHA1
cd4c1262df956f0a7dc9d98b96aa5367b8f9003d
-
SHA256
fc5d73a95abb848576fbde8604dfde6145277131dc9be39cdbaf84644d174029
-
SHA512
c41130467ba9b467f00798783c91e37d26f3c28e743ada5b725f0c6aea1fe841e9047acf04e57cebe739e5defdf9150ce641e49f1e2d7d09abd0a1e1d17a81f1
-
SSDEEP
12288:ZMrly90hMOBS+UCCPcrM0JNCL20ThdSVVFbXtdWwNbSezqnnCM6LJw:MySlS+UAM0JExTOZDtdhtzaClw
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1