General
-
Target
6743d53ca63b14c6d080e645695fdb37030fcaac2a9e0f8c6232036bd3634f72
-
Size
705KB
-
Sample
241104-qxsyxazlds
-
MD5
1e3fee3084178586ce5424fd676dc059
-
SHA1
41168dc4cd113ab017db814803503adc9776681d
-
SHA256
6743d53ca63b14c6d080e645695fdb37030fcaac2a9e0f8c6232036bd3634f72
-
SHA512
2e20acaead44ce14ac1393c95bd390ab16a904b04cc0b62910f26d22b865ef67dc4433e83f17510944cda3e54c1108cb897059f99aba3e45efecd2bd88137959
-
SSDEEP
12288:9Mrdy90L6q65EpVgue/DWXPnyzi+UE7L4wpyGJEarq0v2RfXwJRaGtG5iyUuz:AyO6q65Ewue/DoPqifE7LhjF29PoRaLh
Static task
static1
Behavioral task
behavioral1
Sample
6743d53ca63b14c6d080e645695fdb37030fcaac2a9e0f8c6232036bd3634f72.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
6743d53ca63b14c6d080e645695fdb37030fcaac2a9e0f8c6232036bd3634f72
-
Size
705KB
-
MD5
1e3fee3084178586ce5424fd676dc059
-
SHA1
41168dc4cd113ab017db814803503adc9776681d
-
SHA256
6743d53ca63b14c6d080e645695fdb37030fcaac2a9e0f8c6232036bd3634f72
-
SHA512
2e20acaead44ce14ac1393c95bd390ab16a904b04cc0b62910f26d22b865ef67dc4433e83f17510944cda3e54c1108cb897059f99aba3e45efecd2bd88137959
-
SSDEEP
12288:9Mrdy90L6q65EpVgue/DWXPnyzi+UE7L4wpyGJEarq0v2RfXwJRaGtG5iyUuz:AyO6q65Ewue/DoPqifE7LhjF29PoRaLh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1