General
-
Target
321242c06b161adb22658319a0f8fd504219212162b794d3b4b5043770acba31
-
Size
540KB
-
Sample
241104-rmd8fa1fnp
-
MD5
4c95398c85c8e83ee84ebbde16763acd
-
SHA1
cc539cd7a76cf2e47d7709477348867a54579987
-
SHA256
321242c06b161adb22658319a0f8fd504219212162b794d3b4b5043770acba31
-
SHA512
e400c928c66511518f5ac2ac23a5c9c75497524b4f66bdb5e2592193e3afbcfc9492e17945f63e99b040dc462bddcc0467d9b1950b57deed67c2425ad7dac2a6
-
SSDEEP
12288:0Mryy90kdusx/RDysxQO7hi02bSXAA+K0lFy4:+yxY6+LO7h3WSXkK0lA4
Static task
static1
Behavioral task
behavioral1
Sample
321242c06b161adb22658319a0f8fd504219212162b794d3b4b5043770acba31.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
321242c06b161adb22658319a0f8fd504219212162b794d3b4b5043770acba31
-
Size
540KB
-
MD5
4c95398c85c8e83ee84ebbde16763acd
-
SHA1
cc539cd7a76cf2e47d7709477348867a54579987
-
SHA256
321242c06b161adb22658319a0f8fd504219212162b794d3b4b5043770acba31
-
SHA512
e400c928c66511518f5ac2ac23a5c9c75497524b4f66bdb5e2592193e3afbcfc9492e17945f63e99b040dc462bddcc0467d9b1950b57deed67c2425ad7dac2a6
-
SSDEEP
12288:0Mryy90kdusx/RDysxQO7hi02bSXAA+K0lFy4:+yxY6+LO7h3WSXkK0lA4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1