General
-
Target
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da
-
Size
1.3MB
-
Sample
230919-eb317sgg34
-
MD5
93a7586d443d59ff92d973074d42b0ef
-
SHA1
34770e92b345d6f715deb25cd21c2ebdf831e0ba
-
SHA256
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da
-
SHA512
785b8fd6e8f9ada21c59670998548bb346f16a1027cb2e650ec01ca0584a4c0d9fb09404f891d0a54212dc102cc85789a64e83d39a5861136cc497262993c2ef
-
SSDEEP
24576:e09RTcXhMhHXImriEFxJSuAajgBE5DIcCgBQ:e09RIRM5XImriLuyy5DbCgBQ
Static task
static1
Behavioral task
behavioral1
Sample
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da.exe
Resource
win10-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da
-
Size
1.3MB
-
MD5
93a7586d443d59ff92d973074d42b0ef
-
SHA1
34770e92b345d6f715deb25cd21c2ebdf831e0ba
-
SHA256
a40176f76cf15f08346844c423af391095fcb07c83b1368fc9afd0456e84f1da
-
SHA512
785b8fd6e8f9ada21c59670998548bb346f16a1027cb2e650ec01ca0584a4c0d9fb09404f891d0a54212dc102cc85789a64e83d39a5861136cc497262993c2ef
-
SSDEEP
24576:e09RTcXhMhHXImriEFxJSuAajgBE5DIcCgBQ:e09RIRM5XImriLuyy5DbCgBQ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1