General
-
Target
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c
-
Size
479KB
-
Sample
241104-qxf94ssreq
-
MD5
854393bc150bff711a2a25b356d03341
-
SHA1
d19170628a3535020a4d04ec9ab6c82a84a69656
-
SHA256
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c
-
SHA512
262d9cd9e837f97879cc6530694ff1a72306ac4a9cd634d245035c2af7a6c01771b8ba9324f3133d763a2e83239746f5b469465c1f475c4c5cc84133a955dd97
-
SSDEEP
12288:PMrYy90796sP5c1u31/TL+uFILc3/XcobrbeUdT2pa:DyeRXBTHNPcwGo2a
Static task
static1
Behavioral task
behavioral1
Sample
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c
-
Size
479KB
-
MD5
854393bc150bff711a2a25b356d03341
-
SHA1
d19170628a3535020a4d04ec9ab6c82a84a69656
-
SHA256
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c
-
SHA512
262d9cd9e837f97879cc6530694ff1a72306ac4a9cd634d245035c2af7a6c01771b8ba9324f3133d763a2e83239746f5b469465c1f475c4c5cc84133a955dd97
-
SSDEEP
12288:PMrYy90796sP5c1u31/TL+uFILc3/XcobrbeUdT2pa:DyeRXBTHNPcwGo2a
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1