General
-
Target
70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5
-
Size
530KB
-
Sample
241104-rbpvsszncy
-
MD5
6a123325bcb970084369fd0fa00ea6cb
-
SHA1
962b29a4bb031914349fe0b3551a36082fdd6c96
-
SHA256
70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5
-
SHA512
ee07365c6b43cb73d084e6d253873c51543550017f8c26d0229092657c27b1cae9990f49a5901551715bd878966c4e578518f6dc290ea71b945c0b8f7bbd6f9e
-
SSDEEP
12288:qMr3y90pHLtWfe/G19hBosQTvh3cOAPuIcOK:9ywHLtl/GPhBHGNYugK
Static task
static1
Behavioral task
behavioral1
Sample
70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Targets
-
-
Target
70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5
-
Size
530KB
-
MD5
6a123325bcb970084369fd0fa00ea6cb
-
SHA1
962b29a4bb031914349fe0b3551a36082fdd6c96
-
SHA256
70f06dab9cd5714df376fd3bb9228e0bd2a4dd7be1df4a2e3f90512c427b8dd5
-
SHA512
ee07365c6b43cb73d084e6d253873c51543550017f8c26d0229092657c27b1cae9990f49a5901551715bd878966c4e578518f6dc290ea71b945c0b8f7bbd6f9e
-
SSDEEP
12288:qMr3y90pHLtWfe/G19hBosQTvh3cOAPuIcOK:9ywHLtl/GPhBHGNYugK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1