General
-
Target
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd
-
Size
1.2MB
-
Sample
231013-fc7lfsgb83
-
MD5
48696f23706f300c52b22b0f6bf64442
-
SHA1
c22fae747bbe2750aa0d189bde85889a9dc64c1c
-
SHA256
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd
-
SHA512
debf7e0241a96a9e91c2c22852ebd46a96edf789bd9a1d950df3fee0f13db00b1463e860917b0b2fc35c34dcdd0d1058498d890ad3dbf9717f05c39533147b40
-
SSDEEP
24576:974cru7u4Ww72pJpu1tZN+uaJVobWLSZLnE0P40VwOCiUaxG:x4cruzf7kTmtPJAoKeZccG
Static task
static1
Behavioral task
behavioral1
Sample
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Targets
-
-
Target
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd
-
Size
1.2MB
-
MD5
48696f23706f300c52b22b0f6bf64442
-
SHA1
c22fae747bbe2750aa0d189bde85889a9dc64c1c
-
SHA256
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd
-
SHA512
debf7e0241a96a9e91c2c22852ebd46a96edf789bd9a1d950df3fee0f13db00b1463e860917b0b2fc35c34dcdd0d1058498d890ad3dbf9717f05c39533147b40
-
SSDEEP
24576:974cru7u4Ww72pJpu1tZN+uaJVobWLSZLnE0P40VwOCiUaxG:x4cruzf7kTmtPJAoKeZccG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1