General
-
Target
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22
-
Size
2.6MB
-
Sample
231012-n55assah99
-
MD5
417d0554c7f79458682763044a771084
-
SHA1
31386b623d1c36613dcd48bdc2ab5a1edf19edf4
-
SHA256
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22
-
SHA512
07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b
-
SSDEEP
49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH
Static task
static1
Behavioral task
behavioral1
Sample
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Targets
-
-
Target
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22
-
Size
2.6MB
-
MD5
417d0554c7f79458682763044a771084
-
SHA1
31386b623d1c36613dcd48bdc2ab5a1edf19edf4
-
SHA256
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22
-
SHA512
07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b
-
SSDEEP
49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1