General
-
Target
avira_spotlight_setup.exe
-
Size
34.2MB
-
Sample
241204-x5lm5axkgx
-
MD5
972eb9126d92fea2626690bef903aad6
-
SHA1
9def5004dc267f77f5cfb7070e85d330b8e33638
-
SHA256
858c355a5723e866dd9379765f2672976b4a097d836e8b5a2cd865f9819492a2
-
SHA512
2283f4ab903c98ccfb0a79154d5ad32b4af1ac4e8e7d71d583bbdbbd0ca866449e6c7658a8ac6b1e6061c448fa34e3b0a84b84efc023e5b2c80ca71c6aeb048a
-
SSDEEP
786432:CxgDPaSv7Kbd46LHeyvLXGx5ncGmGGxqe6PqiDViD:JKbd46bC5ncz/xy7DVo
Static task
static1
Behavioral task
behavioral1
Sample
avira_spotlight_setup.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
avira_spotlight_setup.exe
-
Size
34.2MB
-
MD5
972eb9126d92fea2626690bef903aad6
-
SHA1
9def5004dc267f77f5cfb7070e85d330b8e33638
-
SHA256
858c355a5723e866dd9379765f2672976b4a097d836e8b5a2cd865f9819492a2
-
SHA512
2283f4ab903c98ccfb0a79154d5ad32b4af1ac4e8e7d71d583bbdbbd0ca866449e6c7658a8ac6b1e6061c448fa34e3b0a84b84efc023e5b2c80ca71c6aeb048a
-
SSDEEP
786432:CxgDPaSv7Kbd46LHeyvLXGx5ncGmGGxqe6PqiDViD:JKbd46bC5ncz/xy7DVo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Creates new service(s)
-
Checks for any installed AV software in registry
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1