General
-
Target
e78da6221b0753644a09316c5c8fecb2a14e0bae2d9a38d8ac497573a952ceb4
-
Size
768KB
-
Sample
230912-m4g87sed95
-
MD5
c2d280d5dd66c8a297f2e19713ea6a90
-
SHA1
0d4d56a897012f7b28a476a7b839bf7f3d386c76
-
SHA256
e78da6221b0753644a09316c5c8fecb2a14e0bae2d9a38d8ac497573a952ceb4
-
SHA512
7d8cec302af3e79d9d348bff17d79f92bc0e101da10c55784f2300a676286ff946bb8eeb5ebf481cb20e765e719bc31cf9957189cd5569c5f7e737ce6f12040d
-
SSDEEP
12288:QMr5y90zM4qBXurPsrbi67bRbx7sD/Hd4cCMUKrcprko/VSXJTZrTIKZqF9Fmj:5yQmZuraLbRRsDl4cd1i3UK9e
Static task
static1
Behavioral task
behavioral1
Sample
e78da6221b0753644a09316c5c8fecb2a14e0bae2d9a38d8ac497573a952ceb4.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
lada
77.91.124.82:19071
-
auth_value
252f78fed0684205b098417688fa33e2
Targets
-
-
Target
e78da6221b0753644a09316c5c8fecb2a14e0bae2d9a38d8ac497573a952ceb4
-
Size
768KB
-
MD5
c2d280d5dd66c8a297f2e19713ea6a90
-
SHA1
0d4d56a897012f7b28a476a7b839bf7f3d386c76
-
SHA256
e78da6221b0753644a09316c5c8fecb2a14e0bae2d9a38d8ac497573a952ceb4
-
SHA512
7d8cec302af3e79d9d348bff17d79f92bc0e101da10c55784f2300a676286ff946bb8eeb5ebf481cb20e765e719bc31cf9957189cd5569c5f7e737ce6f12040d
-
SSDEEP
12288:QMr5y90zM4qBXurPsrbi67bRbx7sD/Hd4cCMUKrcprko/VSXJTZrTIKZqF9Fmj:5yQmZuraLbRRsDl4cd1i3UK9e
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1