General
-
Target
652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7
-
Size
1.3MB
-
Sample
231011-1zdxwafb8y
-
MD5
2e8567723aaa87b49fd94246f14e38a8
-
SHA1
36668635afded3ec3fa87d7e3e290dc55aaebb8a
-
SHA256
652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7
-
SHA512
d0470b373d403d2fbba3aa3e50163bb762cdd97041946937d6481da8247af4caae424b6bce7ce29a874c29394ca680b0ba092b218c7d3f138c749e84832d55b9
-
SSDEEP
24576:LyIYKAnMirrs0OBArPlep+eS4SHJimHLWz0rUzZoKqwC1HL8p/SFZ1i:+oAMes0O2LkoeS4Spb/o5qwELe/SFZ1
Static task
static1
Behavioral task
behavioral1
Sample
652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
nanya
77.91.124.82:19071
-
auth_value
640aa5afe54f566d8795f0dc723f8b52
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7
-
Size
1.3MB
-
MD5
2e8567723aaa87b49fd94246f14e38a8
-
SHA1
36668635afded3ec3fa87d7e3e290dc55aaebb8a
-
SHA256
652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7
-
SHA512
d0470b373d403d2fbba3aa3e50163bb762cdd97041946937d6481da8247af4caae424b6bce7ce29a874c29394ca680b0ba092b218c7d3f138c749e84832d55b9
-
SSDEEP
24576:LyIYKAnMirrs0OBArPlep+eS4SHJimHLWz0rUzZoKqwC1HL8p/SFZ1i:+oAMes0O2LkoeS4Spb/o5qwELe/SFZ1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1