General
-
Target
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
Size
685KB
-
Sample
241030-1ajrtszpgx
-
MD5
5873a2e6e767dd09b70c57b0f098cd31
-
SHA1
eaa5469600568d26ce2b0be3720cb6d4a8fdb03f
-
SHA256
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
SHA512
3438d8376e01b5b9f8301dd6fa6c488f6440a4d589d191206433a2fd2fbb14718e6d2a8b7b2a5401dfd158c3681630814924a9e10f2ba9755bb0d4986cd02f1f
-
SSDEEP
12288:fMrKy90GHnQy70dGyOJlHa4WjOrSZiZ5FEvOjJg6Mc4w2m+Y4sqYB:FylAG/Ha4dN5WGjJH4sd
Static task
static1
Behavioral task
behavioral1
Sample
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
Size
685KB
-
MD5
5873a2e6e767dd09b70c57b0f098cd31
-
SHA1
eaa5469600568d26ce2b0be3720cb6d4a8fdb03f
-
SHA256
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
SHA512
3438d8376e01b5b9f8301dd6fa6c488f6440a4d589d191206433a2fd2fbb14718e6d2a8b7b2a5401dfd158c3681630814924a9e10f2ba9755bb0d4986cd02f1f
-
SSDEEP
12288:fMrKy90GHnQy70dGyOJlHa4WjOrSZiZ5FEvOjJg6Mc4w2m+Y4sqYB:FylAG/Ha4dN5WGjJH4sd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1