General
-
Target
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48
-
Size
1.5MB
-
Sample
241104-qx4emszgpd
-
MD5
ab3083bbcf97ff1458e0ac05561265b8
-
SHA1
0196d620f0bbaa0fc41727a9e8af84a6d76663c7
-
SHA256
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48
-
SHA512
540d0780a3aa2071fc939992cdf6a6604a4f917edccbdca12115e221548efa7840a403357b103ee4ba177d650ffc8c96ea302298edf683c53395cd1ad61d2bda
-
SSDEEP
24576:yygZarBGTynGwT3egDGqod2Bgbp8qD1qUWJnOrAsp625QMxTbQtcRRjH17mbMPUT:ZgwrBGOGwjeQGSO9HQdOrAs/264cjrha
Static task
static1
Behavioral task
behavioral1
Sample
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48
-
Size
1.5MB
-
MD5
ab3083bbcf97ff1458e0ac05561265b8
-
SHA1
0196d620f0bbaa0fc41727a9e8af84a6d76663c7
-
SHA256
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48
-
SHA512
540d0780a3aa2071fc939992cdf6a6604a4f917edccbdca12115e221548efa7840a403357b103ee4ba177d650ffc8c96ea302298edf683c53395cd1ad61d2bda
-
SSDEEP
24576:yygZarBGTynGwT3egDGqod2Bgbp8qD1qUWJnOrAsp625QMxTbQtcRRjH17mbMPUT:ZgwrBGOGwjeQGSO9HQdOrAs/264cjrha
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1