General
-
Target
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f
-
Size
720KB
-
Sample
240526-fq3vesga2z
-
MD5
26a6c9f571da1f281827229690bbc262
-
SHA1
916c94c00abe47abecc7945ed6db2471b32462bf
-
SHA256
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f
-
SHA512
ddffa882c5da55f3fb6ac445aa5c2a18c56c7f08bd2a6bf66a2dc8bae5fa4e27e6f8ac235c845de3104336bdc68064081f5d1b349b930d7816eb4fa44aab3342
-
SSDEEP
12288:iICy90HakVOwfql3+fYShpuFNjicL7w/XhhXcSSr6G2K4GgfXt+3:8y6wlJKhpuFNxc/XDZe6XVGgf9+3
Static task
static1
Behavioral task
behavioral1
Sample
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
mucha
83.97.73.131:19071
-
auth_value
5d76e123341992ecf110010eb89456f0
Targets
-
-
Target
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f
-
Size
720KB
-
MD5
26a6c9f571da1f281827229690bbc262
-
SHA1
916c94c00abe47abecc7945ed6db2471b32462bf
-
SHA256
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f
-
SHA512
ddffa882c5da55f3fb6ac445aa5c2a18c56c7f08bd2a6bf66a2dc8bae5fa4e27e6f8ac235c845de3104336bdc68064081f5d1b349b930d7816eb4fa44aab3342
-
SSDEEP
12288:iICy90HakVOwfql3+fYShpuFNjicL7w/XhhXcSSr6G2K4GgfXt+3:8y6wlJKhpuFNxc/XDZe6XVGgf9+3
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Detects executables packed with ConfuserEx Mod
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1