General
-
Target
4e4f544d405162b99c4c86ca8e985f9cb8942cd9c383cf87aea453c312eae917
-
Size
851KB
-
Sample
241104-recpms1enn
-
MD5
f5b74be8769a84af5d29f3b7afb6462e
-
SHA1
e73914264bddae42c0e7d615d559fd123678b182
-
SHA256
4e4f544d405162b99c4c86ca8e985f9cb8942cd9c383cf87aea453c312eae917
-
SHA512
99f5d7c915e01c487f38f474f916762c985c022d4b68bde328cb7a894bf16e366eceb1536de71ba17f417d212f3f20a8586eb7ba3e653f4985b84f131c61697b
-
SSDEEP
12288:XMrcy909+e5YIuYMVcl+FbcpVHMVB2jh0fiFMFsXhp0rHZ4o/CVU5118DbQg1JlS:fySZ5YIuDk+NczwIvMFmp0r/CVU5Sf6
Static task
static1
Behavioral task
behavioral1
Sample
4e4f544d405162b99c4c86ca8e985f9cb8942cd9c383cf87aea453c312eae917.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
4e4f544d405162b99c4c86ca8e985f9cb8942cd9c383cf87aea453c312eae917
-
Size
851KB
-
MD5
f5b74be8769a84af5d29f3b7afb6462e
-
SHA1
e73914264bddae42c0e7d615d559fd123678b182
-
SHA256
4e4f544d405162b99c4c86ca8e985f9cb8942cd9c383cf87aea453c312eae917
-
SHA512
99f5d7c915e01c487f38f474f916762c985c022d4b68bde328cb7a894bf16e366eceb1536de71ba17f417d212f3f20a8586eb7ba3e653f4985b84f131c61697b
-
SSDEEP
12288:XMrcy909+e5YIuYMVcl+FbcpVHMVB2jh0fiFMFsXhp0rHZ4o/CVU5118DbQg1JlS:fySZ5YIuDk+NczwIvMFmp0r/CVU5Sf6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1