General
-
Target
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699
-
Size
930KB
-
Sample
231014-ej7z5ahc95
-
MD5
734a023fa9fa82776fc53c2df87b7fdd
-
SHA1
eea9aa9fc02c97f13e0b68eedf1adb2e9f7242d9
-
SHA256
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699
-
SHA512
ef751bb0db9e3ff69a182610fc52bcd50e14af354de8df0016ab8f42c82b55f21bfd1415059f975f347b930e90c149294ae30686167f02725bfda12407bbc58a
-
SSDEEP
12288:Mz//yfYb5BIQZVt9lEfjOyxoHuRd76fK4GNrdaOWHn5eBoytHxQk5E5SL9:WiuBtZENd76fwdabHn5WxQysSh
Static task
static1
Behavioral task
behavioral1
Sample
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699
-
Size
930KB
-
MD5
734a023fa9fa82776fc53c2df87b7fdd
-
SHA1
eea9aa9fc02c97f13e0b68eedf1adb2e9f7242d9
-
SHA256
6872427be16ef40aa63fa4eda70686710de1031508a48644fdc131e4f2638699
-
SHA512
ef751bb0db9e3ff69a182610fc52bcd50e14af354de8df0016ab8f42c82b55f21bfd1415059f975f347b930e90c149294ae30686167f02725bfda12407bbc58a
-
SSDEEP
12288:Mz//yfYb5BIQZVt9lEfjOyxoHuRd76fK4GNrdaOWHn5eBoytHxQk5E5SL9:WiuBtZENd76fwdabHn5WxQysSh
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1