General
-
Target
b13337f962e439aa83e82d0b7e1310bbe34bdefc372f48b25e23ab8256e16594
-
Size
1.1MB
-
Sample
241104-q114pa1crm
-
MD5
998eccf26e123335a9d00699aae4c43a
-
SHA1
274edeac2d797412876ad2e9676234bba3853a67
-
SHA256
b13337f962e439aa83e82d0b7e1310bbe34bdefc372f48b25e23ab8256e16594
-
SHA512
cbaab87905881fda6f7dcc408d1be7988f4444117fc8d65b1eef428d4ece64adf3a9c2251da8de0ab59b8b5bb3c85ae440f3bc098ba3edecf82733f8f6b359ef
-
SSDEEP
24576:Cy/CNPxgPMcewjwjJ1lyzNTnqrl7Wl5iJ7KHxjePNEB3En:pyxgRsjJCTnqrl7Wy7KHxOe3E
Static task
static1
Behavioral task
behavioral1
Sample
b13337f962e439aa83e82d0b7e1310bbe34bdefc372f48b25e23ab8256e16594.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
b13337f962e439aa83e82d0b7e1310bbe34bdefc372f48b25e23ab8256e16594
-
Size
1.1MB
-
MD5
998eccf26e123335a9d00699aae4c43a
-
SHA1
274edeac2d797412876ad2e9676234bba3853a67
-
SHA256
b13337f962e439aa83e82d0b7e1310bbe34bdefc372f48b25e23ab8256e16594
-
SHA512
cbaab87905881fda6f7dcc408d1be7988f4444117fc8d65b1eef428d4ece64adf3a9c2251da8de0ab59b8b5bb3c85ae440f3bc098ba3edecf82733f8f6b359ef
-
SSDEEP
24576:Cy/CNPxgPMcewjwjJ1lyzNTnqrl7Wl5iJ7KHxjePNEB3En:pyxgRsjJCTnqrl7Wy7KHxOe3E
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1