General
-
Target
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752
-
Size
836KB
-
Sample
241104-qp8z6a1bkq
-
MD5
0117e2ab3d9a5419081a7797ecca29a7
-
SHA1
66b32b8cb4dd2aa3d2e3df8077cc840cacd2746c
-
SHA256
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752
-
SHA512
521927d18db0460eb87de832058b5e95af875591434caef7d1609e5cc4fcfa98d67f02d7c926218ce26bc7b9460a9dc223b4ff64d43cab14af25c5057ba1f7d1
-
SSDEEP
24576:1ykiGWVqqSCSwRfkB5EhVqbDJixzorrff:QkfyJZSaFmD4zWrf
Static task
static1
Behavioral task
behavioral1
Sample
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752
-
Size
836KB
-
MD5
0117e2ab3d9a5419081a7797ecca29a7
-
SHA1
66b32b8cb4dd2aa3d2e3df8077cc840cacd2746c
-
SHA256
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752
-
SHA512
521927d18db0460eb87de832058b5e95af875591434caef7d1609e5cc4fcfa98d67f02d7c926218ce26bc7b9460a9dc223b4ff64d43cab14af25c5057ba1f7d1
-
SSDEEP
24576:1ykiGWVqqSCSwRfkB5EhVqbDJixzorrff:QkfyJZSaFmD4zWrf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1