General
-
Target
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892
-
Size
2.6MB
-
Sample
231012-nq42gshh43
-
MD5
f361baba5e868ba8a847bc36fe791300
-
SHA1
f70029bd1bf0c44cb3018138d3bf1fa4914bb9ff
-
SHA256
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892
-
SHA512
a815eba2e8d37bec6176079d0abc085f3104243bcc16009daff651d9559bf4ea6b2d6e142c62ef5040332a7b58271712963f4a144bb8c4a4725295d30dac7b0b
-
SSDEEP
49152:/99i4yt/SSaeh56Eyks8xXZgO6zIEcKc0INzJguMQ:ESGy2X+dG0IzN
Static task
static1
Behavioral task
behavioral1
Sample
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Targets
-
-
Target
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892
-
Size
2.6MB
-
MD5
f361baba5e868ba8a847bc36fe791300
-
SHA1
f70029bd1bf0c44cb3018138d3bf1fa4914bb9ff
-
SHA256
4461598e10d14c054f4a34754be68c0156ed493a19e8657a5502862d87311892
-
SHA512
a815eba2e8d37bec6176079d0abc085f3104243bcc16009daff651d9559bf4ea6b2d6e142c62ef5040332a7b58271712963f4a144bb8c4a4725295d30dac7b0b
-
SSDEEP
49152:/99i4yt/SSaeh56Eyks8xXZgO6zIEcKc0INzJguMQ:ESGy2X+dG0IzN
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1