General
-
Target
e23bfc038f9c9348b338ced43bbcc823c487edd579575e4cb2255876d50be723
-
Size
1.5MB
-
Sample
241104-qjybga1amr
-
MD5
3f8eb5521cd2e574a40793f025509c91
-
SHA1
7bbb137dcf320d59c100b6abbc9c7a7db42f504c
-
SHA256
e23bfc038f9c9348b338ced43bbcc823c487edd579575e4cb2255876d50be723
-
SHA512
c98b2d1c6d11483e130b2c150730e934a41da0000a730da40bba2c704816a9fdb85deefb852939e8c6771881a4dd7e7c0200b73485b1342f7eddd9ee9f86cfa8
-
SSDEEP
49152:u1koChCNzrppJ5RFcXblrR5qOs8WN0sg4:faPJ5XMXBWN
Static task
static1
Behavioral task
behavioral1
Sample
e23bfc038f9c9348b338ced43bbcc823c487edd579575e4cb2255876d50be723.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
e23bfc038f9c9348b338ced43bbcc823c487edd579575e4cb2255876d50be723
-
Size
1.5MB
-
MD5
3f8eb5521cd2e574a40793f025509c91
-
SHA1
7bbb137dcf320d59c100b6abbc9c7a7db42f504c
-
SHA256
e23bfc038f9c9348b338ced43bbcc823c487edd579575e4cb2255876d50be723
-
SHA512
c98b2d1c6d11483e130b2c150730e934a41da0000a730da40bba2c704816a9fdb85deefb852939e8c6771881a4dd7e7c0200b73485b1342f7eddd9ee9f86cfa8
-
SSDEEP
49152:u1koChCNzrppJ5RFcXblrR5qOs8WN0sg4:faPJ5XMXBWN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1