General
-
Target
9b093029d88b2cf0ef3585e643a4e616d9b59bb8557cfbb72fbc83ba57e48c24
-
Size
1.5MB
-
Sample
241104-q8btrstkcj
-
MD5
47d241e28d7425af7214f892fdea3be9
-
SHA1
f66b2c1a0c919ffb14cf0483b67636f9baefb16d
-
SHA256
9b093029d88b2cf0ef3585e643a4e616d9b59bb8557cfbb72fbc83ba57e48c24
-
SHA512
20cefdf5747a7e97d54d80db8e65ec3e103e7b21dede5cb64cc7fd95e9f2dfd30faadbb1a011aaa289a1b4d8c1e6f96a4ce8d0f1a474cf6a3bfa4068de148d8d
-
SSDEEP
24576:8yyXvJ2JunFWNx+9XSm2KTJQ72oqrqezQLM+X9Wpx/r1CTdZAD4Ny034ZKZ5xJcK:r+vJ2knFEg9XPJQ72oCqO6X9Wv/rg7xb
Static task
static1
Behavioral task
behavioral1
Sample
9b093029d88b2cf0ef3585e643a4e616d9b59bb8557cfbb72fbc83ba57e48c24.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Targets
-
-
Target
9b093029d88b2cf0ef3585e643a4e616d9b59bb8557cfbb72fbc83ba57e48c24
-
Size
1.5MB
-
MD5
47d241e28d7425af7214f892fdea3be9
-
SHA1
f66b2c1a0c919ffb14cf0483b67636f9baefb16d
-
SHA256
9b093029d88b2cf0ef3585e643a4e616d9b59bb8557cfbb72fbc83ba57e48c24
-
SHA512
20cefdf5747a7e97d54d80db8e65ec3e103e7b21dede5cb64cc7fd95e9f2dfd30faadbb1a011aaa289a1b4d8c1e6f96a4ce8d0f1a474cf6a3bfa4068de148d8d
-
SSDEEP
24576:8yyXvJ2JunFWNx+9XSm2KTJQ72oqrqezQLM+X9Wpx/r1CTdZAD4Ny034ZKZ5xJcK:r+vJ2knFEg9XPJQ72oCqO6X9Wv/rg7xb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1