General
-
Target
29c01ad33ca786d5059307c6dc90f05fa212596f2a5906924d36886ea5837675
-
Size
1.0MB
-
Sample
240927-z6grnszfmk
-
MD5
952195bdb3f28b26ac1cfa514176b2ce
-
SHA1
0eec1d319d905808e61012b5942038114b4fbf87
-
SHA256
29c01ad33ca786d5059307c6dc90f05fa212596f2a5906924d36886ea5837675
-
SHA512
9898ba3f16360532bdfd80fc7b84e0c77df8a095d18a3a84f025cacce0244083b834d68ce354f25d42e8bad02a458492847f5963fa44f1bead456d81907a8bc3
-
SSDEEP
12288:KMr9y90KdNQvVKKq5X72pwSiEX2yiqS2pKv/9AS5gaDCKgOrOSCJGtqVF3XarfKj:vyXiVCL9EA2UYAOJrVFarI/2S
Static task
static1
Behavioral task
behavioral1
Sample
29c01ad33ca786d5059307c6dc90f05fa212596f2a5906924d36886ea5837675.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Targets
-
-
Target
29c01ad33ca786d5059307c6dc90f05fa212596f2a5906924d36886ea5837675
-
Size
1.0MB
-
MD5
952195bdb3f28b26ac1cfa514176b2ce
-
SHA1
0eec1d319d905808e61012b5942038114b4fbf87
-
SHA256
29c01ad33ca786d5059307c6dc90f05fa212596f2a5906924d36886ea5837675
-
SHA512
9898ba3f16360532bdfd80fc7b84e0c77df8a095d18a3a84f025cacce0244083b834d68ce354f25d42e8bad02a458492847f5963fa44f1bead456d81907a8bc3
-
SSDEEP
12288:KMr9y90KdNQvVKKq5X72pwSiEX2yiqS2pKv/9AS5gaDCKgOrOSCJGtqVF3XarfKj:vyXiVCL9EA2UYAOJrVFarI/2S
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1