General
-
Target
adbee7b9427bbf762fb6138e7f4475ed7b47fda025dca124887065055a75cd59
-
Size
767KB
-
Sample
230912-mx2n9sed57
-
MD5
0b1e0ea0aab3729fb1321b910c92beef
-
SHA1
c4b918961aa2847c026d474d8c6deb2b3cce186e
-
SHA256
adbee7b9427bbf762fb6138e7f4475ed7b47fda025dca124887065055a75cd59
-
SHA512
286cf39c32ebf800b6e74223ad89b11f37b232ee71f9eca8154e0ce3b574330f07aaa876e44dffe71318dc2d92b940b45562f15fcc1e87a22d5535de10bde326
-
SSDEEP
12288:RMrVy90wgoEhHfi7CWk6LfWxuV+mHYTsZ3rTNNUQ328TsSHBUugpIX8bmHhZy1Zj:kyPzeSCWPfWuHaslHNNLUxc8SBYrdBgK
Static task
static1
Behavioral task
behavioral1
Sample
adbee7b9427bbf762fb6138e7f4475ed7b47fda025dca124887065055a75cd59.exe
Resource
win10-20230831-en
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Targets
-
-
Target
adbee7b9427bbf762fb6138e7f4475ed7b47fda025dca124887065055a75cd59
-
Size
767KB
-
MD5
0b1e0ea0aab3729fb1321b910c92beef
-
SHA1
c4b918961aa2847c026d474d8c6deb2b3cce186e
-
SHA256
adbee7b9427bbf762fb6138e7f4475ed7b47fda025dca124887065055a75cd59
-
SHA512
286cf39c32ebf800b6e74223ad89b11f37b232ee71f9eca8154e0ce3b574330f07aaa876e44dffe71318dc2d92b940b45562f15fcc1e87a22d5535de10bde326
-
SSDEEP
12288:RMrVy90wgoEhHfi7CWk6LfWxuV+mHYTsZ3rTNNUQ328TsSHBUugpIX8bmHhZy1Zj:kyPzeSCWPfWuHaslHNNLUxc8SBYrdBgK
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1