General
-
Target
49111f64bed0ab901f9a2a7f547cba60_NEAS
-
Size
1.3MB
-
Sample
240507-b549ksfg79
-
MD5
49111f64bed0ab901f9a2a7f547cba60
-
SHA1
be2abdba42ca9e759cb5e4cb746f7dd93d5c858d
-
SHA256
a20ea0ab1ca65283cd9159a21f6ea1d68985284bd9238692a3dd365994b2ac85
-
SHA512
9ca7bdf2c762f072dc10dc81f7d807fa69bc11fc4ba240986caf13c2f08874529aa5e30fe72d937f49e872c6b415db82877bd7f25219d688d494378bdf52e882
-
SSDEEP
24576:+y8sfz+SJ60o1Jf4iprQ4Bpbco1sAw/hgLJTCnMRSAFFFwfy7y3Kkh:N8sLTJcLVM4BVcouZwCMlMpK
Static task
static1
Behavioral task
behavioral1
Sample
49111f64bed0ab901f9a2a7f547cba60_NEAS.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Targets
-
-
Target
49111f64bed0ab901f9a2a7f547cba60_NEAS
-
Size
1.3MB
-
MD5
49111f64bed0ab901f9a2a7f547cba60
-
SHA1
be2abdba42ca9e759cb5e4cb746f7dd93d5c858d
-
SHA256
a20ea0ab1ca65283cd9159a21f6ea1d68985284bd9238692a3dd365994b2ac85
-
SHA512
9ca7bdf2c762f072dc10dc81f7d807fa69bc11fc4ba240986caf13c2f08874529aa5e30fe72d937f49e872c6b415db82877bd7f25219d688d494378bdf52e882
-
SSDEEP
24576:+y8sfz+SJ60o1Jf4iprQ4Bpbco1sAw/hgLJTCnMRSAFFFwfy7y3Kkh:N8sLTJcLVM4BVcouZwCMlMpK
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1