General
-
Target
ad1822c8ea62bc61b7fb1e3e4211c9e973af5cb06630e16619c3437ba6a50192
-
Size
688KB
-
Sample
241030-1jpz7s1hpd
-
MD5
cea3954511657dd17f09c7ecd509a709
-
SHA1
cb9683ff9648bdbd704ac982c0d4b25ad3d3b3f6
-
SHA256
ad1822c8ea62bc61b7fb1e3e4211c9e973af5cb06630e16619c3437ba6a50192
-
SHA512
93aac48f86734115ac2af5d35ec0f6f335b11d929692b4aeb051c31408d95a48043aa5009b45bf2e83e837461a008a019fd77e6dc5f8e939b459e3026ee1b7ce
-
SSDEEP
12288:qMryy90BLPu7NWZPA/lX060lC9oIZJVmZN7XMEiF7xg43xEYMwKbpZTIQLxN8D:sy0u7NWZel0dE9TmM7i4hbMpNtIJD
Static task
static1
Behavioral task
behavioral1
Sample
ad1822c8ea62bc61b7fb1e3e4211c9e973af5cb06630e16619c3437ba6a50192.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
ad1822c8ea62bc61b7fb1e3e4211c9e973af5cb06630e16619c3437ba6a50192
-
Size
688KB
-
MD5
cea3954511657dd17f09c7ecd509a709
-
SHA1
cb9683ff9648bdbd704ac982c0d4b25ad3d3b3f6
-
SHA256
ad1822c8ea62bc61b7fb1e3e4211c9e973af5cb06630e16619c3437ba6a50192
-
SHA512
93aac48f86734115ac2af5d35ec0f6f335b11d929692b4aeb051c31408d95a48043aa5009b45bf2e83e837461a008a019fd77e6dc5f8e939b459e3026ee1b7ce
-
SSDEEP
12288:qMryy90BLPu7NWZPA/lX060lC9oIZJVmZN7XMEiF7xg43xEYMwKbpZTIQLxN8D:sy0u7NWZel0dE9TmM7i4hbMpNtIJD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1