General
-
Target
JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0
-
Size
829KB
-
Sample
230902-ped7cscg8z
-
MD5
8eca74547b9551d3b9b817d6fc108230
-
SHA1
26f68b6214f258e10f7fdb3f5822ea7b9bc623c8
-
SHA256
be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0
-
SHA512
6121c5b44555ea099e81f5d90c20b7fd6346f94264605bfbb64f42ceb451dcd2aa7543a65517190ed09bef4daf2f108cfd469ae0dfa28ddee8c71bf7cd75839d
-
SSDEEP
12288:ZMrxy90XqmFUDK6L9pUstcSc5dYK2wom/1oEDl9GElbL+dH0BH/9Q8nk:0y6vUBp3tHaeKHloqQ0eHq/Q
Static task
static1
Behavioral task
behavioral1
Sample
JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Targets
-
-
Target
JC_be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0
-
Size
829KB
-
MD5
8eca74547b9551d3b9b817d6fc108230
-
SHA1
26f68b6214f258e10f7fdb3f5822ea7b9bc623c8
-
SHA256
be3fd5d370f9a5df088462db7353b6ff29dbff4659315fdbee02f8a347ad64f0
-
SHA512
6121c5b44555ea099e81f5d90c20b7fd6346f94264605bfbb64f42ceb451dcd2aa7543a65517190ed09bef4daf2f108cfd469ae0dfa28ddee8c71bf7cd75839d
-
SSDEEP
12288:ZMrxy90XqmFUDK6L9pUstcSc5dYK2wom/1oEDl9GElbL+dH0BH/9Q8nk:0y6vUBp3tHaeKHloqQ0eHq/Q
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1