General
-
Target
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957
-
Size
3.1MB
-
Sample
231014-aqceksff8y
-
MD5
720d9f1964944abbe059b557deecf113
-
SHA1
6c1374f692c82c09a9175742debc45b720094595
-
SHA256
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957
-
SHA512
4994cf4fea497f60564bc960cc1e102ad00c16a29270ec29f664b8ed5aece1488b908349411e673a6b89d27f142c499f9490e2dc9d02ceff3f1177d92e75dcfd
-
SSDEEP
49152:3iFzUE1/x5XSke5ec6a3va3F+EGrxflng0AqkPUYm+FO+goH:3iFzvSk12fpghqtYz8+go
Static task
static1
Behavioral task
behavioral1
Sample
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957
-
Size
3.1MB
-
MD5
720d9f1964944abbe059b557deecf113
-
SHA1
6c1374f692c82c09a9175742debc45b720094595
-
SHA256
1050a78f8d2dae2a807468440cee41c2b54add236775376a9d1133b50a569957
-
SHA512
4994cf4fea497f60564bc960cc1e102ad00c16a29270ec29f664b8ed5aece1488b908349411e673a6b89d27f142c499f9490e2dc9d02ceff3f1177d92e75dcfd
-
SSDEEP
49152:3iFzUE1/x5XSke5ec6a3va3F+EGrxflng0AqkPUYm+FO+goH:3iFzvSk12fpghqtYz8+go
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1