General
-
Target
73f35c3cfddd5d37e5f1eec9cce6463496a6ec727ac878378664a3f259538dcb
-
Size
1.1MB
-
Sample
230920-x31dhaac3t
-
MD5
31732df5533c39d11d61a28327f3687f
-
SHA1
d7bc0ea375a40fd61a4d60322add2c13427d1a88
-
SHA256
73f35c3cfddd5d37e5f1eec9cce6463496a6ec727ac878378664a3f259538dcb
-
SHA512
36538e9ddd21783d1105bd9f9fdb9ea88c18fc5eae4017b1954a31a3c2c7da35a594988262f8284ab0c9c03813d6f11c22e403f1a99e78f808dad4ee7b505977
-
SSDEEP
24576:pyIaevTrbjeWezq/ysxQlmXd+V7adpGE6x0:c6vbjegTxQ0Xc7q6
Static task
static1
Behavioral task
behavioral1
Sample
73f35c3cfddd5d37e5f1eec9cce6463496a6ec727ac878378664a3f259538dcb.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Targets
-
-
Target
73f35c3cfddd5d37e5f1eec9cce6463496a6ec727ac878378664a3f259538dcb
-
Size
1.1MB
-
MD5
31732df5533c39d11d61a28327f3687f
-
SHA1
d7bc0ea375a40fd61a4d60322add2c13427d1a88
-
SHA256
73f35c3cfddd5d37e5f1eec9cce6463496a6ec727ac878378664a3f259538dcb
-
SHA512
36538e9ddd21783d1105bd9f9fdb9ea88c18fc5eae4017b1954a31a3c2c7da35a594988262f8284ab0c9c03813d6f11c22e403f1a99e78f808dad4ee7b505977
-
SSDEEP
24576:pyIaevTrbjeWezq/ysxQlmXd+V7adpGE6x0:c6vbjegTxQ0Xc7q6
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1