General
-
Target
63daa2a08e6fd097bede0b73233ad9e20ff61e0bcc54ecd3374195953f985116
-
Size
551KB
-
Sample
241104-remvls1enr
-
MD5
375c08ebc32f705b968fcd54f8bd0b4b
-
SHA1
a059ea23a3de5b6c32a0f8cae03ae6db8cf73207
-
SHA256
63daa2a08e6fd097bede0b73233ad9e20ff61e0bcc54ecd3374195953f985116
-
SHA512
0864e3e3bf6c69c47f6fc187830de75c1d2078a924ed43a68047e79ef3c43848bb19592615c2935b00bc5817aff1e9787acedcb28596710b5e4b25c207521c1c
-
SSDEEP
12288:cMruy905Wqm1xtvGCLKNSzceaG2l5q83OJwgLtjpJ5:ayom1xJYNSzceaGQ48erjp/
Static task
static1
Behavioral task
behavioral1
Sample
63daa2a08e6fd097bede0b73233ad9e20ff61e0bcc54ecd3374195953f985116.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Targets
-
-
Target
63daa2a08e6fd097bede0b73233ad9e20ff61e0bcc54ecd3374195953f985116
-
Size
551KB
-
MD5
375c08ebc32f705b968fcd54f8bd0b4b
-
SHA1
a059ea23a3de5b6c32a0f8cae03ae6db8cf73207
-
SHA256
63daa2a08e6fd097bede0b73233ad9e20ff61e0bcc54ecd3374195953f985116
-
SHA512
0864e3e3bf6c69c47f6fc187830de75c1d2078a924ed43a68047e79ef3c43848bb19592615c2935b00bc5817aff1e9787acedcb28596710b5e4b25c207521c1c
-
SSDEEP
12288:cMruy905Wqm1xtvGCLKNSzceaG2l5q83OJwgLtjpJ5:ayom1xJYNSzceaGQ48erjp/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1