General
-
Target
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25
-
Size
873KB
-
Sample
241107-k8ac2synfs
-
MD5
4300f8bc621a3afcb9442a5c866fbc75
-
SHA1
3921a76e6971773c38145c1454847c7fd8cf20f0
-
SHA256
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25
-
SHA512
a93fed1b66cd0e903fd9d0363dcd8ef9b84af4cf9c79c17dd260574077306697b86271c975e1d66c6e4bc12c5b6423bd2b92f3cc6b11276c4ec5707a4ae722a2
-
SSDEEP
24576:TycPs6HJm3H6iA7IpSoY/29knp9lY58UZlKQxNmp73g:mZMEJB9Up9lclKQxQp7
Static task
static1
Behavioral task
behavioral1
Sample
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25
-
Size
873KB
-
MD5
4300f8bc621a3afcb9442a5c866fbc75
-
SHA1
3921a76e6971773c38145c1454847c7fd8cf20f0
-
SHA256
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25
-
SHA512
a93fed1b66cd0e903fd9d0363dcd8ef9b84af4cf9c79c17dd260574077306697b86271c975e1d66c6e4bc12c5b6423bd2b92f3cc6b11276c4ec5707a4ae722a2
-
SSDEEP
24576:TycPs6HJm3H6iA7IpSoY/29knp9lY58UZlKQxNmp73g:mZMEJB9Up9lclKQxQp7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1