General
-
Target
x1003253.exe
-
Size
326KB
-
Sample
230919-hmnx7shd74
-
MD5
1b2cbe30fa59baf4b7b4ad6656b46dae
-
SHA1
ff9c876e71bce22aeb43bf158d1eea8c3b1ac138
-
SHA256
3934ebd15a6eb483f876d9a76acdadce0c5ce868998a1b72c018c87f46c2e220
-
SHA512
9955312391aee0ef9c8201c709290e5c6e591a96d1090e63fef6417803a96a4bea6d20b0bfba56b1bc6bf4573b78e6a38f46b0e7edfb0490844ef1b9e8257313
-
SSDEEP
6144:K/y+bnr+Fp0yN90QEB59rXgIRn5TdTRjzZph8wfOOgqBay+lHGqBqf:tMrhy903rXDR5RTRxAwyqUXBU
Static task
static1
Behavioral task
behavioral1
Sample
x1003253.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x1003253.exe
Resource
win10-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
x1003253.exe
-
Size
326KB
-
MD5
1b2cbe30fa59baf4b7b4ad6656b46dae
-
SHA1
ff9c876e71bce22aeb43bf158d1eea8c3b1ac138
-
SHA256
3934ebd15a6eb483f876d9a76acdadce0c5ce868998a1b72c018c87f46c2e220
-
SHA512
9955312391aee0ef9c8201c709290e5c6e591a96d1090e63fef6417803a96a4bea6d20b0bfba56b1bc6bf4573b78e6a38f46b0e7edfb0490844ef1b9e8257313
-
SSDEEP
6144:K/y+bnr+Fp0yN90QEB59rXgIRn5TdTRjzZph8wfOOgqBay+lHGqBqf:tMrhy903rXDR5RTRxAwyqUXBU
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1