General
-
Target
d80ed0298bba52014c504beee1d8d79f030c4c1a773463bdfcb96db25bbc019a
-
Size
556KB
-
Sample
241030-1vptks1jes
-
MD5
c6c4322a7af76e06e7ac6ea98750f64d
-
SHA1
d6fa5cf092a3b37bff371120c1530fdd61f36948
-
SHA256
d80ed0298bba52014c504beee1d8d79f030c4c1a773463bdfcb96db25bbc019a
-
SHA512
bdbda970ae10dc0791744d823f36b256f95eb26f8d60b6fb6724887199ca0146a5dd4c16a96c31d6ac4f4dfe33730f5dc064f3b36e095a795ad345e9e0eb2be7
-
SSDEEP
12288:9MrBy90o9qSukKVYjIUZg1hZYH19N2gFhE2Hj1aarSc:8ydvZg7ZMR2Opp
Static task
static1
Behavioral task
behavioral1
Sample
d80ed0298bba52014c504beee1d8d79f030c4c1a773463bdfcb96db25bbc019a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
d80ed0298bba52014c504beee1d8d79f030c4c1a773463bdfcb96db25bbc019a
-
Size
556KB
-
MD5
c6c4322a7af76e06e7ac6ea98750f64d
-
SHA1
d6fa5cf092a3b37bff371120c1530fdd61f36948
-
SHA256
d80ed0298bba52014c504beee1d8d79f030c4c1a773463bdfcb96db25bbc019a
-
SHA512
bdbda970ae10dc0791744d823f36b256f95eb26f8d60b6fb6724887199ca0146a5dd4c16a96c31d6ac4f4dfe33730f5dc064f3b36e095a795ad345e9e0eb2be7
-
SSDEEP
12288:9MrBy90o9qSukKVYjIUZg1hZYH19N2gFhE2Hj1aarSc:8ydvZg7ZMR2Opp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1