General
-
Target
x0152493.exe
-
Size
776KB
-
Sample
230919-hnfyzsfd6t
-
MD5
e5ed98e8c559c2b4fa39ac65df23acbc
-
SHA1
ac40f951df6670db14fc5b995d0837df900f53a2
-
SHA256
84d57ba5b907bee85896dd7e76ca5d0f1fc4ac8998062b0b97ea4d4e7b4e5ca9
-
SHA512
e8eb3c240e4f515582e8723b1d0d0046307876318f29388df163bb50f9f6f227da3ea29707d813b4b1dfa7ab6da1ef42c11088492a46cd74a344f69028111c00
-
SSDEEP
12288:mMr4y90Efv9ot3T+XRgplf4YR+LKRYQt4vXwqU0h7h6qnUfe/kRjvJYv+:iy+igplf1TZ+Y8VoqUfe/ejR
Static task
static1
Behavioral task
behavioral1
Sample
x0152493.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x0152493.exe
Resource
win10-20230915-en
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Targets
-
-
Target
x0152493.exe
-
Size
776KB
-
MD5
e5ed98e8c559c2b4fa39ac65df23acbc
-
SHA1
ac40f951df6670db14fc5b995d0837df900f53a2
-
SHA256
84d57ba5b907bee85896dd7e76ca5d0f1fc4ac8998062b0b97ea4d4e7b4e5ca9
-
SHA512
e8eb3c240e4f515582e8723b1d0d0046307876318f29388df163bb50f9f6f227da3ea29707d813b4b1dfa7ab6da1ef42c11088492a46cd74a344f69028111c00
-
SSDEEP
12288:mMr4y90Efv9ot3T+XRgplf4YR+LKRYQt4vXwqU0h7h6qnUfe/kRjvJYv+:iy+igplf1TZ+Y8VoqUfe/ejR
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1