General
-
Target
1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0
-
Size
479KB
-
Sample
241030-12rlrasbrf
-
MD5
b6bf0f1a8b20c949745b9d66f0e39428
-
SHA1
dfdc3f44858e29305d0a6fd11f953cd4d27d1ec1
-
SHA256
1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0
-
SHA512
820c3675b52e8e35241ad4f864adcedf475e4a825391fa75205b130baecfa325c8792cc7ea32b4acf88637a70fa83741322996d3a405a4a5feed11845450cf17
-
SSDEEP
12288:MMrgy90Sb2Tl6i+A3dR0ncn9GwPDI94BgCq5QGxyJU:cyT2Tl3nd9G5Us5QXJU
Static task
static1
Behavioral task
behavioral1
Sample
1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Targets
-
-
Target
1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0
-
Size
479KB
-
MD5
b6bf0f1a8b20c949745b9d66f0e39428
-
SHA1
dfdc3f44858e29305d0a6fd11f953cd4d27d1ec1
-
SHA256
1d74f48646b449fcc497b045e8b9f95dc34b834653908d6c88affa96b860daa0
-
SHA512
820c3675b52e8e35241ad4f864adcedf475e4a825391fa75205b130baecfa325c8792cc7ea32b4acf88637a70fa83741322996d3a405a4a5feed11845450cf17
-
SSDEEP
12288:MMrgy90Sb2Tl6i+A3dR0ncn9GwPDI94BgCq5QGxyJU:cyT2Tl3nd9G5Us5QXJU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1