General
-
Target
d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13
-
Size
693KB
-
Sample
240304-a7c3faeb38
-
MD5
b9a1ee247b89fbbfe76c215073d96b4f
-
SHA1
6117cb9a38775531f8a83d42c2c1328e8c1a6183
-
SHA256
d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13
-
SHA512
bdee37b241dc4f0a496e483982d54810a60479c6ae39a67d5194de558b05f3f9ab611eff3a73d78bdfb89ef7569449b3845549feea89c291a6540656dcec3aae
-
SSDEEP
12288:uMrHy90KdEfVhXaxZILGYumxTDBhCDpCGhHEdamOAY+x8KVe:5yPCVuxmxT73GhH0ue6
Static task
static1
Behavioral task
behavioral1
Sample
d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13
-
Size
693KB
-
MD5
b9a1ee247b89fbbfe76c215073d96b4f
-
SHA1
6117cb9a38775531f8a83d42c2c1328e8c1a6183
-
SHA256
d47c8f91ec2375996ef9a6247f30a70118425ea23afb06d9e87597292eb15f13
-
SHA512
bdee37b241dc4f0a496e483982d54810a60479c6ae39a67d5194de558b05f3f9ab611eff3a73d78bdfb89ef7569449b3845549feea89c291a6540656dcec3aae
-
SSDEEP
12288:uMrHy90KdEfVhXaxZILGYumxTDBhCDpCGhHEdamOAY+x8KVe:5yPCVuxmxT73GhH0ue6
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1