General
-
Target
a53587ef301becac798c694804c61691a814e0dc85d2fe5e131b152ab698c86b
-
Size
481KB
-
Sample
241104-rawa7a1anb
-
MD5
455cf9565892f32636aac2aa375c6490
-
SHA1
907eb333af343c6116e6c7e9edd1f80639d4cfff
-
SHA256
a53587ef301becac798c694804c61691a814e0dc85d2fe5e131b152ab698c86b
-
SHA512
c47e65bcf5ebc672defb69f18c58b9c878454c1641e2cadf0c8110e53f188754f86275d823996239ae3ed47a9dd9ff3131f05d03340613f409f0f66962881ddc
-
SSDEEP
12288:2Mr/y9032syvzujjplajR2DZNlLMeDVF:pyH/+q4lLlF
Static task
static1
Behavioral task
behavioral1
Sample
a53587ef301becac798c694804c61691a814e0dc85d2fe5e131b152ab698c86b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Targets
-
-
Target
a53587ef301becac798c694804c61691a814e0dc85d2fe5e131b152ab698c86b
-
Size
481KB
-
MD5
455cf9565892f32636aac2aa375c6490
-
SHA1
907eb333af343c6116e6c7e9edd1f80639d4cfff
-
SHA256
a53587ef301becac798c694804c61691a814e0dc85d2fe5e131b152ab698c86b
-
SHA512
c47e65bcf5ebc672defb69f18c58b9c878454c1641e2cadf0c8110e53f188754f86275d823996239ae3ed47a9dd9ff3131f05d03340613f409f0f66962881ddc
-
SSDEEP
12288:2Mr/y9032syvzujjplajR2DZNlLMeDVF:pyH/+q4lLlF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1