General
-
Target
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0
-
Size
1.2MB
-
Sample
231013-flg26aeg5w
-
MD5
9f84fdb05cc4534d6421d2a652a92a39
-
SHA1
a5eb895a6acb05b0a91565cc330d24feec6bceab
-
SHA256
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0
-
SHA512
ec827dbca47aa50fcc6ad7e629326d76ee4e11c76ac2a48af086b01857369ef5018cf58b98f64535888b4804967abeba1f5547336cb074352ce63d4500ce5af6
-
SSDEEP
24576:J74cr9pNvxrS8r8o884vYjfT+45gE9d0wfWoDEQquDLTNRV6HG:t4cr9HVS8F8nvYbT+45gE9djW7MDp6HG
Static task
static1
Behavioral task
behavioral1
Sample
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Targets
-
-
Target
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0
-
Size
1.2MB
-
MD5
9f84fdb05cc4534d6421d2a652a92a39
-
SHA1
a5eb895a6acb05b0a91565cc330d24feec6bceab
-
SHA256
448f631bdfbcec0ac93bd2bbdaf60f9f25b6c1b838b2f073acafc6edbf3644d0
-
SHA512
ec827dbca47aa50fcc6ad7e629326d76ee4e11c76ac2a48af086b01857369ef5018cf58b98f64535888b4804967abeba1f5547336cb074352ce63d4500ce5af6
-
SSDEEP
24576:J74cr9pNvxrS8r8o884vYjfT+45gE9d0wfWoDEQquDLTNRV6HG:t4cr9HVS8F8nvYbT+45gE9djW7MDp6HG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1