General
-
Target
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1
-
Size
1.3MB
-
Sample
231012-qzdl1aee42
-
MD5
15191b422ca8442afe30ca33f4e14a92
-
SHA1
cd99d2c31e956dd0cfdc9326673e1da692ae45ba
-
SHA256
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1
-
SHA512
76b5a8e4c58fc7edcebdaa59d5aaa1aaf4f66e16ddf31b6e9c3c1a071c779ad0d7c474a7bcf9e186c438ce4bb2a24ad2be427608e29b367575648b85ee1df418
-
SSDEEP
24576:4iGL5iZipp5tB2faukLIFyInKW277WUf+mV+eMj3s:k5iZiprT2iukLLInK/bfN+lj3s
Static task
static1
Behavioral task
behavioral1
Sample
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Targets
-
-
Target
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1
-
Size
1.3MB
-
MD5
15191b422ca8442afe30ca33f4e14a92
-
SHA1
cd99d2c31e956dd0cfdc9326673e1da692ae45ba
-
SHA256
8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1
-
SHA512
76b5a8e4c58fc7edcebdaa59d5aaa1aaf4f66e16ddf31b6e9c3c1a071c779ad0d7c474a7bcf9e186c438ce4bb2a24ad2be427608e29b367575648b85ee1df418
-
SSDEEP
24576:4iGL5iZipp5tB2faukLIFyInKW277WUf+mV+eMj3s:k5iZiprT2iukLLInK/bfN+lj3s
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1