General
-
Target
5819d30d5536a389ede8af7ebff6905d6c5499615d279be504d50aab89c11989
-
Size
479KB
-
Sample
241104-q8eknatkcl
-
MD5
992289fb5a8a6ea45d9c2c4ade6fb833
-
SHA1
2148660453f3d8fa1be56fcd634e88229daa504c
-
SHA256
5819d30d5536a389ede8af7ebff6905d6c5499615d279be504d50aab89c11989
-
SHA512
e3027b5fd99061cc389e1181ffbaa9de18fddb0ac9fc06d5edcfbd2861f88327de6d33c216b637016e89cfd047e4ac97f9012a4e6f829a5bc6b8221f934a507f
-
SSDEEP
12288:bMrZy90YeL+fdosBdtxugBx6e+IGZ/0DKp:OyldjdjrB+IaAe
Static task
static1
Behavioral task
behavioral1
Sample
5819d30d5536a389ede8af7ebff6905d6c5499615d279be504d50aab89c11989.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diwer
217.196.96.101:4132
-
auth_value
42abfa9e4f2e290c8bdbc776fd9bb6ad
Targets
-
-
Target
5819d30d5536a389ede8af7ebff6905d6c5499615d279be504d50aab89c11989
-
Size
479KB
-
MD5
992289fb5a8a6ea45d9c2c4ade6fb833
-
SHA1
2148660453f3d8fa1be56fcd634e88229daa504c
-
SHA256
5819d30d5536a389ede8af7ebff6905d6c5499615d279be504d50aab89c11989
-
SHA512
e3027b5fd99061cc389e1181ffbaa9de18fddb0ac9fc06d5edcfbd2861f88327de6d33c216b637016e89cfd047e4ac97f9012a4e6f829a5bc6b8221f934a507f
-
SSDEEP
12288:bMrZy90YeL+fdosBdtxugBx6e+IGZ/0DKp:OyldjdjrB+IaAe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1