General
-
Target
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106
-
Size
930KB
-
Sample
231014-d21hbsfg59
-
MD5
8e45781a495c31858ee36eaa7756da0f
-
SHA1
7db5ec48ac923aea0781241dd8c8c6deedf8291a
-
SHA256
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106
-
SHA512
68230ef47598fc6186a5083c72064f5c2a1fcf6c5005d5bd8142223f5c23fa9d5539a297da8f06ec3ab571a66e89415013266ed063dd3bb8dfad345dce9d658d
-
SSDEEP
24576:oiuBtZRIXaM6NUeI1p/VXksfsF1wR3XFo:fuBfRIKhUeIL/RkOsF1wR3C
Static task
static1
Behavioral task
behavioral1
Sample
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106
-
Size
930KB
-
MD5
8e45781a495c31858ee36eaa7756da0f
-
SHA1
7db5ec48ac923aea0781241dd8c8c6deedf8291a
-
SHA256
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106
-
SHA512
68230ef47598fc6186a5083c72064f5c2a1fcf6c5005d5bd8142223f5c23fa9d5539a297da8f06ec3ab571a66e89415013266ed063dd3bb8dfad345dce9d658d
-
SSDEEP
24576:oiuBtZRIXaM6NUeI1p/VXksfsF1wR3XFo:fuBfRIKhUeIL/RkOsF1wR3C
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1