General
-
Target
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N
-
Size
473KB
-
Sample
241103-kj5snazfnm
-
MD5
e51225531182c11a62584a3899342020
-
SHA1
326bca9fb80a27585cc510f28154873745f12e38
-
SHA256
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71
-
SHA512
0b6860b6b352daecc7f81677c9cf739472439a6e736d20bad16a3de25a6b72ca319cd71673bb31e80b020204d4798401aa3b33378e7750f7e5e9a291fed0a15e
-
SSDEEP
12288:/MrMy90BjEe45JUFUBIJGB+vs5nwgos/XmoyR5u:ry8jEe45JUFCcGB+vs5nNo2Gu
Static task
static1
Behavioral task
behavioral1
Sample
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Targets
-
-
Target
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N
-
Size
473KB
-
MD5
e51225531182c11a62584a3899342020
-
SHA1
326bca9fb80a27585cc510f28154873745f12e38
-
SHA256
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71
-
SHA512
0b6860b6b352daecc7f81677c9cf739472439a6e736d20bad16a3de25a6b72ca319cd71673bb31e80b020204d4798401aa3b33378e7750f7e5e9a291fed0a15e
-
SSDEEP
12288:/MrMy90BjEe45JUFUBIJGB+vs5nwgos/XmoyR5u:ry8jEe45JUFCcGB+vs5nNo2Gu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1