General
-
Target
09f4b5574f199582a24d3b81007be1c2949c13a4a03a4ffe381b5518235b4d74
-
Size
1.0MB
-
Sample
241104-qj13cssphp
-
MD5
04d4d41c50594ffa30a970708b9f5368
-
SHA1
f86de3838f1b224f039100a5f0ce1f80835bb28b
-
SHA256
09f4b5574f199582a24d3b81007be1c2949c13a4a03a4ffe381b5518235b4d74
-
SHA512
2cc1d0c08d829498e3a7ddbac39e450881b5ed3c6026d8d8675b2662a563fd0282ccc2e0b69e89a56d532c6a988c9483a0d74a7c90ad332f915ba72da28e70a6
-
SSDEEP
24576:yyZVUSZtmk+FfIdYMF+9E9GlHxnTJPCuPdvLrSMc6HEXv0:ZZ2StL+WdTFyAiRVKuPsMZEX
Static task
static1
Behavioral task
behavioral1
Sample
09f4b5574f199582a24d3b81007be1c2949c13a4a03a4ffe381b5518235b4d74.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
09f4b5574f199582a24d3b81007be1c2949c13a4a03a4ffe381b5518235b4d74
-
Size
1.0MB
-
MD5
04d4d41c50594ffa30a970708b9f5368
-
SHA1
f86de3838f1b224f039100a5f0ce1f80835bb28b
-
SHA256
09f4b5574f199582a24d3b81007be1c2949c13a4a03a4ffe381b5518235b4d74
-
SHA512
2cc1d0c08d829498e3a7ddbac39e450881b5ed3c6026d8d8675b2662a563fd0282ccc2e0b69e89a56d532c6a988c9483a0d74a7c90ad332f915ba72da28e70a6
-
SSDEEP
24576:yyZVUSZtmk+FfIdYMF+9E9GlHxnTJPCuPdvLrSMc6HEXv0:ZZ2StL+WdTFyAiRVKuPsMZEX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1