General
-
Target
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932
-
Size
707KB
-
Sample
231012-b97khagh3w
-
MD5
af2e92d8bc98c86c3230c8cfa9356da5
-
SHA1
896650bbd6962cee4ebe06ae03d95b2a80c4bb56
-
SHA256
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932
-
SHA512
f621514c3bfd06f12e46868e2135cac382a97a31b480b6a76bcf2a44c8dd8619fc79a5d9e3df06faaa44831d8136fbef18f66f97454cb58a8b53fab173b946e9
-
SSDEEP
12288:6MrEy90tKhfjzGbx8A9eX3CqNmg7ow8EizLEzePJS5aLoey1FY4Js8aRdZ:ay+KFjzAOAIX9Nmioeiz+ehS5xWEafZ
Static task
static1
Behavioral task
behavioral1
Sample
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Targets
-
-
Target
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932
-
Size
707KB
-
MD5
af2e92d8bc98c86c3230c8cfa9356da5
-
SHA1
896650bbd6962cee4ebe06ae03d95b2a80c4bb56
-
SHA256
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932
-
SHA512
f621514c3bfd06f12e46868e2135cac382a97a31b480b6a76bcf2a44c8dd8619fc79a5d9e3df06faaa44831d8136fbef18f66f97454cb58a8b53fab173b946e9
-
SSDEEP
12288:6MrEy90tKhfjzGbx8A9eX3CqNmg7ow8EizLEzePJS5aLoey1FY4Js8aRdZ:ay+KFjzAOAIX9Nmioeiz+ehS5xWEafZ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1