General
-
Target
0e310a4beabce8d3252d2ac1a20ad7aef2a39756a977bd7d9da9b18349605d98
-
Size
392KB
-
Sample
241108-gxn6aaxcnc
-
MD5
c1a41f561e4faf68d78bcbb40e046d41
-
SHA1
2b2f1dcc064635495191f13c4b1d33c420a0e412
-
SHA256
0e310a4beabce8d3252d2ac1a20ad7aef2a39756a977bd7d9da9b18349605d98
-
SHA512
49a136d173aecbe8508216beaf2a74bc7396de9c8f2f24557eb281d9edb7a589cc4cdf40482e5e40dc040da4ad5779a49ba9873fa1a2a5be066b0302e469c18f
-
SSDEEP
6144:KHy+bnr+hp0yN90QEsnUHYO+EYJjcXr2+zte+sP+0YB9YKTcruuQ:hMrhy90aVZy72+ztY+0wiic8
Static task
static1
Behavioral task
behavioral1
Sample
0e310a4beabce8d3252d2ac1a20ad7aef2a39756a977bd7d9da9b18349605d98.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diza
193.56.146.11:4173
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
0e310a4beabce8d3252d2ac1a20ad7aef2a39756a977bd7d9da9b18349605d98
-
Size
392KB
-
MD5
c1a41f561e4faf68d78bcbb40e046d41
-
SHA1
2b2f1dcc064635495191f13c4b1d33c420a0e412
-
SHA256
0e310a4beabce8d3252d2ac1a20ad7aef2a39756a977bd7d9da9b18349605d98
-
SHA512
49a136d173aecbe8508216beaf2a74bc7396de9c8f2f24557eb281d9edb7a589cc4cdf40482e5e40dc040da4ad5779a49ba9873fa1a2a5be066b0302e469c18f
-
SSDEEP
6144:KHy+bnr+hp0yN90QEsnUHYO+EYJjcXr2+zte+sP+0YB9YKTcruuQ:hMrhy90aVZy72+ztY+0wiic8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1