General
-
Target
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c
-
Size
1.2MB
-
Sample
231013-fpscasgg95
-
MD5
e60ed0d8c974487f04e3378bb94a04fd
-
SHA1
e95f80ae73bb386dd530fde1684abc8e7d31c212
-
SHA256
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c
-
SHA512
b7ac59987789c0a2871ef2f38fce14ae94cdd70a82fa0f14b524b49eb49f4c0d94fb4a4ae8c075a9cf50875d3839fdc11754c08fa6bf401dcb929eec72795379
-
SSDEEP
24576:kBuqRflRAIMfhLSD30UsG94ZbYNDvVK0cleIMmG:0uqRflRg4D30bK4ZM5V/meIG
Static task
static1
Behavioral task
behavioral1
Sample
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Targets
-
-
Target
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c
-
Size
1.2MB
-
MD5
e60ed0d8c974487f04e3378bb94a04fd
-
SHA1
e95f80ae73bb386dd530fde1684abc8e7d31c212
-
SHA256
ebcca1953ce353103090d50c3053cf10a16ca497d181f9839aeb36a9e8786c3c
-
SHA512
b7ac59987789c0a2871ef2f38fce14ae94cdd70a82fa0f14b524b49eb49f4c0d94fb4a4ae8c075a9cf50875d3839fdc11754c08fa6bf401dcb929eec72795379
-
SSDEEP
24576:kBuqRflRAIMfhLSD30UsG94ZbYNDvVK0cleIMmG:0uqRflRg4D30bK4ZM5V/meIG
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1