General
-
Target
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee
-
Size
550KB
-
Sample
241104-rpxgsszqdw
-
MD5
b3eaa7306d7a80b3b41dfda3aab9c97e
-
SHA1
223741db58ef3bf4f82d961d2e9ec688f4435856
-
SHA256
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee
-
SHA512
dddb1228c1ccb86f7e4f9db3d41e3d8a3704bfb9faf3115136716f6f3cde965538650ad206cb0cd19de59b4a2bf542e6cb71c39cf6c44f4111cbcc52cfa2e777
-
SSDEEP
12288:nMrEy90zx4yi5Kud0jXnv8FzphtckFj86mbTarG:Hy89iajXv8Fz6/6ma6
Static task
static1
Behavioral task
behavioral1
Sample
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Targets
-
-
Target
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee
-
Size
550KB
-
MD5
b3eaa7306d7a80b3b41dfda3aab9c97e
-
SHA1
223741db58ef3bf4f82d961d2e9ec688f4435856
-
SHA256
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee
-
SHA512
dddb1228c1ccb86f7e4f9db3d41e3d8a3704bfb9faf3115136716f6f3cde965538650ad206cb0cd19de59b4a2bf542e6cb71c39cf6c44f4111cbcc52cfa2e777
-
SSDEEP
12288:nMrEy90zx4yi5Kud0jXnv8FzphtckFj86mbTarG:Hy89iajXv8Fz6/6ma6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1