General
-
Target
18830b4174ba621190c622f8ec8e148178b3e6e2afab7aa143992a0ff903d976
-
Size
695KB
-
Sample
241105-p79hza1jhz
-
MD5
6b301f849a4b48eddaa3e9e6d370b7ad
-
SHA1
2028501f9ef0325d24cc2bab4615a776f057c36b
-
SHA256
18830b4174ba621190c622f8ec8e148178b3e6e2afab7aa143992a0ff903d976
-
SHA512
cddfea831a5667763c24abde2bfc0e0252d301aefea6765ed4e592efc7c19173c17242e1bb91b1a0e7aa85d81a3dbe82c8cadc2e1c7417e2dcd4c5caa106e1b5
-
SSDEEP
12288:j+8WwCCP8n/rwdMY4E6MyHRDgqWBtoT5/bDsyscsbiSZPCK9T9LHEdp0:jEwI/Ub4eAdgqWBteDsyhSZPCoTydp0
Static task
static1
Behavioral task
behavioral1
Sample
202e690447812603792d0a7bebc2657f724623bbbc418e35805fdbc975397120.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
202e690447812603792d0a7bebc2657f724623bbbc418e35805fdbc975397120.exe
-
Size
738KB
-
MD5
7a86c899903d0a6dc4d85a577434c6db
-
SHA1
101534da15517334cd02368e0282aef11d368a7e
-
SHA256
202e690447812603792d0a7bebc2657f724623bbbc418e35805fdbc975397120
-
SHA512
8e0cb4f764c37bc0846c193931790036b2cfb9928d34fccb69be7152ee89cdee2ab2642091be31c15c66d7fdd2d9e45c5525774022fb1052512972b04fc66b7c
-
SSDEEP
12288:4MrHy90+FrUG3YB60FXccGjC3AM1DuWvk6V/2MNY2S0S0obzeG15Mo3DQCotd71V:fyLALIFcRW58VS0KbzLPzQCyci
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1