General
-
Target
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155
-
Size
3.1MB
-
Sample
231014-a2jb9shh24
-
MD5
2855392cec4f8929f43dfdee1304c984
-
SHA1
07046d28bae2268a8e2608880b2b12010dc9ff60
-
SHA256
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155
-
SHA512
13689f5c4d6ea8c8d44259d3cbb942e2fe96b0a8520ec11da029e71a021f3619d83eeb2d79c2de1f20e5edf423fb1515e25c2affe32bd8e7520eeaf4c2d830a2
-
SSDEEP
49152:8sSnXgA9x4vsraFn6a3vtvE5iFHIf/tB4INwvxWIx9hQXxHCy:8sSn0s98AiB+NYsH
Static task
static1
Behavioral task
behavioral1
Sample
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155
-
Size
3.1MB
-
MD5
2855392cec4f8929f43dfdee1304c984
-
SHA1
07046d28bae2268a8e2608880b2b12010dc9ff60
-
SHA256
a994918b082806da67e3873503edffd92500c5821949cc73368fb8be25bf2155
-
SHA512
13689f5c4d6ea8c8d44259d3cbb942e2fe96b0a8520ec11da029e71a021f3619d83eeb2d79c2de1f20e5edf423fb1515e25c2affe32bd8e7520eeaf4c2d830a2
-
SSDEEP
49152:8sSnXgA9x4vsraFn6a3vtvE5iFHIf/tB4INwvxWIx9hQXxHCy:8sSn0s98AiB+NYsH
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1