General
-
Target
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b
-
Size
930KB
-
Sample
231014-e11mdagc2w
-
MD5
f295f8609fa587474b799b73ab698d02
-
SHA1
0f4e212ecdbeb2194edc511b5a7c5f28a62b84f1
-
SHA256
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b
-
SHA512
db007e2555f23a3b1b6cf0a2371721264d11b8b6402bf32e3869e5ee2248b5931c321b5250df6e5b334eb70840e7eeb585b4c0cf4d60e4abb02e11580c9df0a3
-
SSDEEP
24576:viuBtZ30EbSXofVh9eRMsytklEqSzkd57Qe:KuBf3tGwgMhklfMa5Z
Static task
static1
Behavioral task
behavioral1
Sample
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b
-
Size
930KB
-
MD5
f295f8609fa587474b799b73ab698d02
-
SHA1
0f4e212ecdbeb2194edc511b5a7c5f28a62b84f1
-
SHA256
89fb970cad17fc7747c92fdecb31f5e844e0e47854499b9103ce4ab5b526e83b
-
SHA512
db007e2555f23a3b1b6cf0a2371721264d11b8b6402bf32e3869e5ee2248b5931c321b5250df6e5b334eb70840e7eeb585b4c0cf4d60e4abb02e11580c9df0a3
-
SSDEEP
24576:viuBtZ30EbSXofVh9eRMsytklEqSzkd57Qe:KuBf3tGwgMhklfMa5Z
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1