General
-
Target
x9391797.exe
-
Size
321KB
-
Sample
230919-hmyseahd84
-
MD5
dba7de05cbeabdc859adfc5b6498a558
-
SHA1
653ebef6f9214b020def4354caa166457dcb8bcb
-
SHA256
3f021e6c4a954aa68bfc5acf5a86dad05b1dd124b742ff26392f7cb71edad49c
-
SHA512
dd716f1414c6bbb0a5dadbc3c6e5596f3b25282711c7ecafc6799a9a3c057d01e1aad924ca5348423449e24386c0e22a15321d739e27ae9bee17bcada8d22c5c
-
SSDEEP
6144:KYy+bnr+ap0yN90QE9WaMye34ulHCg2c+SeaKuKk:sMrOy90xMygHBqL9aKux
Static task
static1
Behavioral task
behavioral1
Sample
x9391797.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x9391797.exe
Resource
win10-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
x9391797.exe
-
Size
321KB
-
MD5
dba7de05cbeabdc859adfc5b6498a558
-
SHA1
653ebef6f9214b020def4354caa166457dcb8bcb
-
SHA256
3f021e6c4a954aa68bfc5acf5a86dad05b1dd124b742ff26392f7cb71edad49c
-
SHA512
dd716f1414c6bbb0a5dadbc3c6e5596f3b25282711c7ecafc6799a9a3c057d01e1aad924ca5348423449e24386c0e22a15321d739e27ae9bee17bcada8d22c5c
-
SSDEEP
6144:KYy+bnr+ap0yN90QE9WaMye34ulHCg2c+SeaKuKk:sMrOy90xMygHBqL9aKux
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1