General
-
Target
55793bac6685f8b6dbd4ae850cae379a8f63d05dc98803e7650ad094070db6f9
-
Size
557KB
-
Sample
241104-rp2rhszqdz
-
MD5
b82d812970f19580ad1c059f5d391784
-
SHA1
2ccee4b26afe417357de0fd587b7bf5850667e76
-
SHA256
55793bac6685f8b6dbd4ae850cae379a8f63d05dc98803e7650ad094070db6f9
-
SHA512
f4b4bc60458f9b06125c314700fbdb52db891e7a0360a50e5ce460eeb11bfbafc4ff7f41d230cf15314a7fcd3bff4303b31bb21647d7c554990ea99b6abc95ef
-
SSDEEP
12288:DMrOy906thGQ5O5uw/xjxT2fsMjGIG2pUMhbGP:By5fNBw/xjxTUtGIGqUdP
Static task
static1
Behavioral task
behavioral1
Sample
55793bac6685f8b6dbd4ae850cae379a8f63d05dc98803e7650ad094070db6f9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
55793bac6685f8b6dbd4ae850cae379a8f63d05dc98803e7650ad094070db6f9
-
Size
557KB
-
MD5
b82d812970f19580ad1c059f5d391784
-
SHA1
2ccee4b26afe417357de0fd587b7bf5850667e76
-
SHA256
55793bac6685f8b6dbd4ae850cae379a8f63d05dc98803e7650ad094070db6f9
-
SHA512
f4b4bc60458f9b06125c314700fbdb52db891e7a0360a50e5ce460eeb11bfbafc4ff7f41d230cf15314a7fcd3bff4303b31bb21647d7c554990ea99b6abc95ef
-
SSDEEP
12288:DMrOy906thGQ5O5uw/xjxT2fsMjGIG2pUMhbGP:By5fNBw/xjxTUtGIGqUdP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1