General
-
Target
b4864a53603aeb680aff9146fbf0bbe7f59dd0ca913a8ec0f9a55bdb94509c1b
-
Size
1.5MB
-
Sample
241104-q9el2szmh1
-
MD5
243b009c520d4dd68e7330b87e64bb2a
-
SHA1
e5fe662fc9abb4f8972de891c85e1517c04f4175
-
SHA256
b4864a53603aeb680aff9146fbf0bbe7f59dd0ca913a8ec0f9a55bdb94509c1b
-
SHA512
ab168813c18dcc502aa956d8f274ae888eca81137b0c8d9e5fd64bcdfb6cc798b502b28d3c88d66ba4d31474db91b9f4079c6e61f3436c32802b9e176a9fe3cc
-
SSDEEP
24576:wyWI6j2oKRiqr6eWf/03ZPzi7wQjITPKxJubulMtJ9urcX7CU19TstCW:3bNr0YFUQu7DETP2uOAacrCU1Fs
Static task
static1
Behavioral task
behavioral1
Sample
b4864a53603aeb680aff9146fbf0bbe7f59dd0ca913a8ec0f9a55bdb94509c1b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
b4864a53603aeb680aff9146fbf0bbe7f59dd0ca913a8ec0f9a55bdb94509c1b
-
Size
1.5MB
-
MD5
243b009c520d4dd68e7330b87e64bb2a
-
SHA1
e5fe662fc9abb4f8972de891c85e1517c04f4175
-
SHA256
b4864a53603aeb680aff9146fbf0bbe7f59dd0ca913a8ec0f9a55bdb94509c1b
-
SHA512
ab168813c18dcc502aa956d8f274ae888eca81137b0c8d9e5fd64bcdfb6cc798b502b28d3c88d66ba4d31474db91b9f4079c6e61f3436c32802b9e176a9fe3cc
-
SSDEEP
24576:wyWI6j2oKRiqr6eWf/03ZPzi7wQjITPKxJubulMtJ9urcX7CU19TstCW:3bNr0YFUQu7DETP2uOAacrCU1Fs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1