General
-
Target
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b
-
Size
3.1MB
-
Sample
231014-bm7a8abb82
-
MD5
5b9ec3fae99bb92e75e9a1f015b3243e
-
SHA1
3c5e818c028c64749214c759ff770ddfb29520ae
-
SHA256
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b
-
SHA512
a46bd9129c8bc108bc3af261e3318849c60fe38ea3713b9a1ebfdf7f62a82d9217a21a9f4864236961a6b3dc09e3c2678aa2b78eac5d618d1e356dc42091f5bc
-
SSDEEP
49152:L0G61NSHhsXL1pxR1d6a3vMUMduYJIWk1KvYY+rClyuqsTgj2mM/7:L0GoL1AAMwYJIWkQvYDrZVsE6
Static task
static1
Behavioral task
behavioral1
Sample
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b
-
Size
3.1MB
-
MD5
5b9ec3fae99bb92e75e9a1f015b3243e
-
SHA1
3c5e818c028c64749214c759ff770ddfb29520ae
-
SHA256
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b
-
SHA512
a46bd9129c8bc108bc3af261e3318849c60fe38ea3713b9a1ebfdf7f62a82d9217a21a9f4864236961a6b3dc09e3c2678aa2b78eac5d618d1e356dc42091f5bc
-
SSDEEP
49152:L0G61NSHhsXL1pxR1d6a3vMUMduYJIWk1KvYY+rClyuqsTgj2mM/7:L0GoL1AAMwYJIWkQvYDrZVsE6
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1