General
-
Target
6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436
-
Size
1.3MB
-
Sample
231011-1aykzsga29
-
MD5
d20c1d311e767b18dc0efa7db05eba0d
-
SHA1
b1446d009d0bbe63aca77b5fc33792240150818d
-
SHA256
6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436
-
SHA512
12845269635c50e6d47e0894fb253b297e81d38e163e1c77e205836d6bd711cbc854cb1ccdd43db80fbf97e35b59f8aaa37eae346b2dae96f08e451de89054c0
-
SSDEEP
24576:GyEW/LdinANhIZnsl6F26vlQd4WqleqjWUCIz93P+sL9SewYCNzz8L63r:V7RrNhcnss84zle6CIzU+9SfJx
Static task
static1
Behavioral task
behavioral1
Sample
6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
nanya
77.91.124.82:19071
-
auth_value
640aa5afe54f566d8795f0dc723f8b52
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436
-
Size
1.3MB
-
MD5
d20c1d311e767b18dc0efa7db05eba0d
-
SHA1
b1446d009d0bbe63aca77b5fc33792240150818d
-
SHA256
6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436
-
SHA512
12845269635c50e6d47e0894fb253b297e81d38e163e1c77e205836d6bd711cbc854cb1ccdd43db80fbf97e35b59f8aaa37eae346b2dae96f08e451de89054c0
-
SSDEEP
24576:GyEW/LdinANhIZnsl6F26vlQd4WqleqjWUCIz93P+sL9SewYCNzz8L63r:V7RrNhcnss84zle6CIzU+9SfJx
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1