General
-
Target
JC_ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817
-
Size
931KB
-
Sample
230902-pas5qada77
-
MD5
e49050b317aad24541dd5dbca50938be
-
SHA1
ebadc3f966daacc222f012a85c50fb3377a46032
-
SHA256
ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817
-
SHA512
8620aa31f41d920e3252d4f043ceb61a535eb27219b28f52029b0949477a3682532629c6257b420c3c9699c5201f1f6b56ed608f7a045f8758c980fc08833730
-
SSDEEP
24576:WyFrj7NkuDfwkoJDDyKWTeXr9Z79EGGfFN:lFrdkuDgDDyH0Z8d
Static task
static1
Behavioral task
behavioral1
Sample
JC_ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817
-
Size
931KB
-
MD5
e49050b317aad24541dd5dbca50938be
-
SHA1
ebadc3f966daacc222f012a85c50fb3377a46032
-
SHA256
ad2cbff95f857666c1139bc90704923214ac2206ef0cab66e7489e5eaa4d3817
-
SHA512
8620aa31f41d920e3252d4f043ceb61a535eb27219b28f52029b0949477a3682532629c6257b420c3c9699c5201f1f6b56ed608f7a045f8758c980fc08833730
-
SSDEEP
24576:WyFrj7NkuDfwkoJDDyKWTeXr9Z79EGGfFN:lFrdkuDgDDyH0Z8d
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1