General
-
Target
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518
-
Size
1.3MB
-
Sample
231012-wcs13ahb58
-
MD5
62b414d8a91d35ab8d0b3103949f75c2
-
SHA1
585fb3dcfab9f1984efa3f6bcf92ec8888f8fae2
-
SHA256
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518
-
SHA512
757a311f78a7ec37e852ba2ad60a754dc108b296a23fe2ca2af4b3f1cd7059746fe4881dfcba8cb58d49a44cd7cfc6339d3a9846b822c6fdcb6123cf350a83c9
-
SSDEEP
24576:20988mMzocwz6Y6egV0eZHThFff77t4EeHDbHktPmHkw5HuY7W0Tuj3ex2bzQ:2093iz6Y5gqeZzf776TEQxwgTuj62bzQ
Static task
static1
Behavioral task
behavioral1
Sample
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Targets
-
-
Target
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518
-
Size
1.3MB
-
MD5
62b414d8a91d35ab8d0b3103949f75c2
-
SHA1
585fb3dcfab9f1984efa3f6bcf92ec8888f8fae2
-
SHA256
a637610a1f5f8cc23edb6ea239d1b4ce0686e9c876d67486a7fcbf0923137518
-
SHA512
757a311f78a7ec37e852ba2ad60a754dc108b296a23fe2ca2af4b3f1cd7059746fe4881dfcba8cb58d49a44cd7cfc6339d3a9846b822c6fdcb6123cf350a83c9
-
SSDEEP
24576:20988mMzocwz6Y6egV0eZHThFff77t4EeHDbHktPmHkw5HuY7W0Tuj3ex2bzQ:2093iz6Y5gqeZzf776TEQxwgTuj62bzQ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1