General
-
Target
df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6
-
Size
1.2MB
-
Sample
231011-3gbqxabe8y
-
MD5
7cad47148c439a91296a9f1862ed9bbc
-
SHA1
6cc4920d08637eb04f9cd19223f9741170849f1d
-
SHA256
df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6
-
SHA512
9ffc1a7ec0acb82447f63199d515f60072b9c51163e4ca6d7c2212fe82c05cf201d5f4074620bcbbc684aa5e5ccc1fde5f4d84146ccce4664783dde70c9a8fa3
-
SSDEEP
24576:gymtSNvzsJJ7f+os2bvLQo4N9OTdPZPH2cs6vgaxqM:nmtAIJJ7fRHrLkN9OTd9Wt6nk
Static task
static1
Behavioral task
behavioral1
Sample
df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
nanya
77.91.124.82:19071
-
auth_value
640aa5afe54f566d8795f0dc723f8b52
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6
-
Size
1.2MB
-
MD5
7cad47148c439a91296a9f1862ed9bbc
-
SHA1
6cc4920d08637eb04f9cd19223f9741170849f1d
-
SHA256
df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6
-
SHA512
9ffc1a7ec0acb82447f63199d515f60072b9c51163e4ca6d7c2212fe82c05cf201d5f4074620bcbbc684aa5e5ccc1fde5f4d84146ccce4664783dde70c9a8fa3
-
SSDEEP
24576:gymtSNvzsJJ7f+os2bvLQo4N9OTdPZPH2cs6vgaxqM:nmtAIJJ7fRHrLkN9OTd9Wt6nk
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1