General
-
Target
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa
-
Size
930KB
-
Sample
231014-elp74ahe53
-
MD5
ae8c1cd8beaa1d8e8cc6a221142722b8
-
SHA1
7b49862f384462593409d8f3d10f19afd05e9abb
-
SHA256
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa
-
SHA512
d7b68e921cd394c06f96391b07525d1a4bf163b63bee76786a7f16437aaada9d3ed8862bbe74e344e8146d4d909c471a5ba5464387590a8ab81107d9fbf92491
-
SSDEEP
24576:+iuBtZgce47lrI3jH/dgPoqX5a6oESIYr3h:tuBfg+7lyjH1ggqX5zoHIYt
Static task
static1
Behavioral task
behavioral1
Sample
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa
-
Size
930KB
-
MD5
ae8c1cd8beaa1d8e8cc6a221142722b8
-
SHA1
7b49862f384462593409d8f3d10f19afd05e9abb
-
SHA256
068afe8976b4672364ddc3876769a283e55c1daca47713dc30a5014f12a7a1aa
-
SHA512
d7b68e921cd394c06f96391b07525d1a4bf163b63bee76786a7f16437aaada9d3ed8862bbe74e344e8146d4d909c471a5ba5464387590a8ab81107d9fbf92491
-
SSDEEP
24576:+iuBtZgce47lrI3jH/dgPoqX5a6oESIYr3h:tuBfg+7lyjH1ggqX5zoHIYt
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1