General
-
Target
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb.exe
-
Size
753KB
-
Sample
231011-d3159aaa8x
-
MD5
cd477aac77d7453206b9e984a4444fc3
-
SHA1
c798de0cf5623a3d7b4beb0e8fa98bb6f32e91b9
-
SHA256
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb
-
SHA512
a9ac3f52f11f0d4c439cbbcf99a864928b5fd4713bc867cc28d33655276e8c853310e7b4d28d99d64bab94377f199b35da24e68d11a0b260a099e1fb583764f8
-
SSDEEP
12288:qMrYy90EqcrEywjFwiKj1PC4/JTc557oUsiB3yPC/oVSnuFlx1GM7Hzj:eyUOiKFC4BTI57oUEkoVcWvnj
Static task
static1
Behavioral task
behavioral1
Sample
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Targets
-
-
Target
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb.exe
-
Size
753KB
-
MD5
cd477aac77d7453206b9e984a4444fc3
-
SHA1
c798de0cf5623a3d7b4beb0e8fa98bb6f32e91b9
-
SHA256
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb
-
SHA512
a9ac3f52f11f0d4c439cbbcf99a864928b5fd4713bc867cc28d33655276e8c853310e7b4d28d99d64bab94377f199b35da24e68d11a0b260a099e1fb583764f8
-
SSDEEP
12288:qMrYy90EqcrEywjFwiKj1PC4/JTc557oUsiB3yPC/oVSnuFlx1GM7Hzj:eyUOiKFC4BTI57oUEkoVcWvnj
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1