General
-
Target
c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e
-
Size
706KB
-
Sample
240910-cd967a1gqk
-
MD5
ab7c0a364c6a9696d4c773b239632261
-
SHA1
00c2538c5a987d078aeac467a8e4bd01017c2d0a
-
SHA256
c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e
-
SHA512
d5c7662d928bef7445bef0418e653bc3be1b4ef551d17ed34031b9e7a6be39e4f457e2829778403a80c80f56878644ba33cf37c21422405114e33b4c60bb06b2
-
SSDEEP
12288:/MrIy90Lh2n1/7XAbu1gOprUqPKKWx5dS1+jrF9gx5DUnbSDqYOgxjTasYINLG:Hyrn1/7wbHOBzydjSYjHgx5DUnGzTx3S
Static task
static1
Behavioral task
behavioral1
Sample
c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
jokes
77.91.124.82:19071
-
auth_value
fb7b36b70ae30fb2b72f789037350cdb
Targets
-
-
Target
c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e
-
Size
706KB
-
MD5
ab7c0a364c6a9696d4c773b239632261
-
SHA1
00c2538c5a987d078aeac467a8e4bd01017c2d0a
-
SHA256
c52d2523c4d8fa5e1812fa3a324c2c47c1309830b0de0bfa27c81d12735f1f5e
-
SHA512
d5c7662d928bef7445bef0418e653bc3be1b4ef551d17ed34031b9e7a6be39e4f457e2829778403a80c80f56878644ba33cf37c21422405114e33b4c60bb06b2
-
SSDEEP
12288:/MrIy90Lh2n1/7XAbu1gOprUqPKKWx5dS1+jrF9gx5DUnbSDqYOgxjTasYINLG:Hyrn1/7wbHOBzydjSYjHgx5DUnGzTx3S
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1