General
-
Target
f9e813df0973d30225cd20811f4a16307c2376058dd4b8a5842f84c107d0f867
-
Size
682KB
-
Sample
241104-rgd1gs1eqp
-
MD5
c762ca176956d9f465c97ec4dfef50f5
-
SHA1
08416925697565fc9eddd74cb3210d81aa8b11b5
-
SHA256
f9e813df0973d30225cd20811f4a16307c2376058dd4b8a5842f84c107d0f867
-
SHA512
67d455d27685166d4cf63e70fae8b43bcdc911afeeced97c47fb5955f1b598d3965b4d11ceaa8eeefdbc03428dff712b36626f20e54d633e757b2f8bd0c21aa8
-
SSDEEP
12288:tMrvy90WZF3Ul+xdmn6JWQUhxk3BNZDvILx/ZD6h0NMqeKI9xtUQ:yyj4+xLTUhxeW/e0NMqeKutUQ
Static task
static1
Behavioral task
behavioral1
Sample
f9e813df0973d30225cd20811f4a16307c2376058dd4b8a5842f84c107d0f867.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Targets
-
-
Target
f9e813df0973d30225cd20811f4a16307c2376058dd4b8a5842f84c107d0f867
-
Size
682KB
-
MD5
c762ca176956d9f465c97ec4dfef50f5
-
SHA1
08416925697565fc9eddd74cb3210d81aa8b11b5
-
SHA256
f9e813df0973d30225cd20811f4a16307c2376058dd4b8a5842f84c107d0f867
-
SHA512
67d455d27685166d4cf63e70fae8b43bcdc911afeeced97c47fb5955f1b598d3965b4d11ceaa8eeefdbc03428dff712b36626f20e54d633e757b2f8bd0c21aa8
-
SSDEEP
12288:tMrvy90WZF3Ul+xdmn6JWQUhxk3BNZDvILx/ZD6h0NMqeKI9xtUQ:yyj4+xLTUhxeW/e0NMqeKutUQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1