General
-
Target
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2
-
Size
1.0MB
-
Sample
241104-ra8aratkfq
-
MD5
5550a7309abbb88245dafd1290c61ed2
-
SHA1
eaab013704d5c7c963cccc645284cdda103847c1
-
SHA256
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2
-
SHA512
dde83af235b5d3e515bb20fcca59bf8c1c551a5df567c402f812db8a7eadbb693331f22a580204b1685205f20fd350923f6befd5e22709ea076d7854850a9d48
-
SSDEEP
24576:/yMkL60tqhYfSb7cFGQ9RkI74wWPNFg0kMM/cySPK:KZ60s6KPcF9/b7wng0k9/ct
Static task
static1
Behavioral task
behavioral1
Sample
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2
-
Size
1.0MB
-
MD5
5550a7309abbb88245dafd1290c61ed2
-
SHA1
eaab013704d5c7c963cccc645284cdda103847c1
-
SHA256
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2
-
SHA512
dde83af235b5d3e515bb20fcca59bf8c1c551a5df567c402f812db8a7eadbb693331f22a580204b1685205f20fd350923f6befd5e22709ea076d7854850a9d48
-
SSDEEP
24576:/yMkL60tqhYfSb7cFGQ9RkI74wWPNFg0kMM/cySPK:KZ60s6KPcF9/b7wng0k9/ct
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1