General
-
Target
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850
-
Size
822KB
-
Sample
241104-q9hcyaznat
-
MD5
2d5708873003468a55a1ef8705cf2845
-
SHA1
eeb33cfb1dbfd7a82858c07c12bf487f84a72812
-
SHA256
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850
-
SHA512
59df849cdfb0a9746175716a1761c9bdb43a7479a0127a197e1bf56c775cc264a00b80e84f81a8deaf8c8d732ed7a10ffcce17a6238ceecd7fec234e5ba7abb1
-
SSDEEP
12288:gHb7pumoYIeAeu6ns+GCu8/Bx7TvkC/4hNdUy9EuZdkRCvRk:gcmoJlGtGp8ZxvkC/4hXU8EnRX
Static task
static1
Behavioral task
behavioral1
Sample
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850
-
Size
822KB
-
MD5
2d5708873003468a55a1ef8705cf2845
-
SHA1
eeb33cfb1dbfd7a82858c07c12bf487f84a72812
-
SHA256
df9a515cea4b10f45f4c9c0193082ee63745faeaa0a67e61c50de9c43913d850
-
SHA512
59df849cdfb0a9746175716a1761c9bdb43a7479a0127a197e1bf56c775cc264a00b80e84f81a8deaf8c8d732ed7a10ffcce17a6238ceecd7fec234e5ba7abb1
-
SSDEEP
12288:gHb7pumoYIeAeu6ns+GCu8/Bx7TvkC/4hNdUy9EuZdkRCvRk:gcmoJlGtGp8ZxvkC/4hXU8EnRX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1