General
-
Target
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5
-
Size
1.3MB
-
Sample
230917-sp1d5aah7t
-
MD5
4a05dd3afee92c247ae5afd584217677
-
SHA1
85617a85e1183f160afbac80fde61aac8c4540e6
-
SHA256
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5
-
SHA512
596e928da5749a9db9a1f2927511aedb3eb81b844639749b55ac1d7e25e1c000160b27c8bef55afd3e39bb242861b3daa5d73aff07dc53f6b956dfcc0175eaf0
-
SSDEEP
24576:209BY6wnpPsz9R8UuCUjEdp/BPsG29RIn+uxiFMcBtPuYdQ:209DUp2CUmj+ZPB29SxtcBs6Q
Static task
static1
Behavioral task
behavioral1
Sample
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe
Resource
win10-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5
-
Size
1.3MB
-
MD5
4a05dd3afee92c247ae5afd584217677
-
SHA1
85617a85e1183f160afbac80fde61aac8c4540e6
-
SHA256
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5
-
SHA512
596e928da5749a9db9a1f2927511aedb3eb81b844639749b55ac1d7e25e1c000160b27c8bef55afd3e39bb242861b3daa5d73aff07dc53f6b956dfcc0175eaf0
-
SSDEEP
24576:209BY6wnpPsz9R8UuCUjEdp/BPsG29RIn+uxiFMcBtPuYdQ:209DUp2CUmj+ZPB29SxtcBs6Q
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1