General
-
Target
virussign.com_7aaf9f676aaa6e8b23968e385f84bc2e.vir
-
Size
1.1MB
-
Sample
240303-kzv86agc4s
-
MD5
7aaf9f676aaa6e8b23968e385f84bc2e
-
SHA1
5d058a78d2f6210f366f7e21102b0d9148d40f75
-
SHA256
1ff8f6e55ed2f5cc79a32a0560c02231e2089c4c5a2193dbbd2ac5955e5bcd12
-
SHA512
d8e3314ba52c42f92cac821bca4da841a5cb2bb53e41226074bc1ce3a5f6407549e509d2cb8f45155c802f8e282e0e0474a5c1f72c45fbc5da88ad07c660261a
-
SSDEEP
24576:eyLmeR3kpJ0sVGxb1gUD4HFKhpHh3SpTmzM9zaFiyK9MVVLjD9lkutA1Q:tbRuJTGxb1DD4EHhiTOF0MVVLl24A1
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_7aaf9f676aaa6e8b23968e385f84bc2e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
virussign.com_7aaf9f676aaa6e8b23968e385f84bc2e.vir
-
Size
1.1MB
-
MD5
7aaf9f676aaa6e8b23968e385f84bc2e
-
SHA1
5d058a78d2f6210f366f7e21102b0d9148d40f75
-
SHA256
1ff8f6e55ed2f5cc79a32a0560c02231e2089c4c5a2193dbbd2ac5955e5bcd12
-
SHA512
d8e3314ba52c42f92cac821bca4da841a5cb2bb53e41226074bc1ce3a5f6407549e509d2cb8f45155c802f8e282e0e0474a5c1f72c45fbc5da88ad07c660261a
-
SSDEEP
24576:eyLmeR3kpJ0sVGxb1gUD4HFKhpHh3SpTmzM9zaFiyK9MVVLjD9lkutA1Q:tbRuJTGxb1DD4EHhiTOF0MVVLl24A1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1