General
-
Target
JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b
-
Size
1.3MB
-
Sample
231012-srrj1agb6z
-
MD5
0ced673fcef72c0455d28236c33cad56
-
SHA1
3abb7ac63bd6801526edcb79b0990409fa7579b5
-
SHA256
484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b
-
SHA512
ff04fd24c473535287b17b9bb68f5d52e0c1f3c63f581c9d1a2cc45321e11f3c3dee488c9cf206b63a4e1b013394ece72b47aac4cded8632282d1a96eab75d31
-
SSDEEP
24576:D09M4MPpLiZdSYjS0Lvw5VTfsHorulhbnGkX9cBsQ:D09M4M1qXSyOJfsHtTbH9AsQ
Static task
static1
Behavioral task
behavioral1
Sample
JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
JC_484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b
-
Size
1.3MB
-
MD5
0ced673fcef72c0455d28236c33cad56
-
SHA1
3abb7ac63bd6801526edcb79b0990409fa7579b5
-
SHA256
484c04930748b8872539ca6a55f63d2398981c8d544d4bcef2c1f8d3e6c7fb3b
-
SHA512
ff04fd24c473535287b17b9bb68f5d52e0c1f3c63f581c9d1a2cc45321e11f3c3dee488c9cf206b63a4e1b013394ece72b47aac4cded8632282d1a96eab75d31
-
SSDEEP
24576:D09M4MPpLiZdSYjS0Lvw5VTfsHorulhbnGkX9cBsQ:D09M4M1qXSyOJfsHtTbH9AsQ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1