General
-
Target
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc
-
Size
930KB
-
Sample
231014-ckmdpsch94
-
MD5
3adaf24d1989bdf0316068a9d979b0f8
-
SHA1
ec573867a14b2d3cdcf22c9482ef33d88804a4ab
-
SHA256
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc
-
SHA512
ce37e4994dc278d662add87a1b133d6bbfccfb43b569a01062f6a0f958095152f3a77adabb2bef3370446c57940a95b6df458232fce6738e70ac3b3c97f5acfb
-
SSDEEP
12288:dx//yfYb5BIQZVtMdSGfwAIFyNsO/f2hY2YSKRZVEnzJsWNww3yMpj0uIgRPAB+3:TiuBtZVCUUXxSMwJNmOyMpj0uJRI+7
Static task
static1
Behavioral task
behavioral1
Sample
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc
-
Size
930KB
-
MD5
3adaf24d1989bdf0316068a9d979b0f8
-
SHA1
ec573867a14b2d3cdcf22c9482ef33d88804a4ab
-
SHA256
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc
-
SHA512
ce37e4994dc278d662add87a1b133d6bbfccfb43b569a01062f6a0f958095152f3a77adabb2bef3370446c57940a95b6df458232fce6738e70ac3b3c97f5acfb
-
SSDEEP
12288:dx//yfYb5BIQZVtMdSGfwAIFyNsO/f2hY2YSKRZVEnzJsWNww3yMpj0uIgRPAB+3:TiuBtZVCUUXxSMwJNmOyMpj0uJRI+7
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1