General
-
Target
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a
-
Size
479KB
-
Sample
241104-qmh1yssqdj
-
MD5
2c9b514a415323ebf0606658b3528d87
-
SHA1
07c5ff681a7bb8db4a4917f3bda2c1fd7dfc808d
-
SHA256
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a
-
SHA512
f509948843e7474c887da2c3096fbe35e8d046fd4fec63ed996bdac2a421920c2d3a9894f8f1dd75d000a8dda09d2e67fc2c712a1c2f649f9f06b27ed6280bed
-
SSDEEP
12288:eMriy90VCHpKCUlcuoWNjb4aouOEemWoDQxLaLVBxz:AyPH0jFQmdVTz
Static task
static1
Behavioral task
behavioral1
Sample
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Targets
-
-
Target
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a
-
Size
479KB
-
MD5
2c9b514a415323ebf0606658b3528d87
-
SHA1
07c5ff681a7bb8db4a4917f3bda2c1fd7dfc808d
-
SHA256
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a
-
SHA512
f509948843e7474c887da2c3096fbe35e8d046fd4fec63ed996bdac2a421920c2d3a9894f8f1dd75d000a8dda09d2e67fc2c712a1c2f649f9f06b27ed6280bed
-
SSDEEP
12288:eMriy90VCHpKCUlcuoWNjb4aouOEemWoDQxLaLVBxz:AyPH0jFQmdVTz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1