General
-
Target
80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b
-
Size
730KB
-
Sample
241108-y53r3s1phr
-
MD5
cb594992778ee446cb4dd8e0f88a1746
-
SHA1
69e8b8e1ff45cd6e7d926d10bbc02b6c93b8dc8d
-
SHA256
80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b
-
SHA512
10e2510cf4db77cd098aa558ba4a1dec5a0dae969cc211c503fa0cbbded2ce5a010e4daa3140bedc2516427fdf918e7bd108925d5fdfa97991729405d5b394dd
-
SSDEEP
12288:lMriy90lSpoWn77cP53KGvDIwEOswU8J212xoGdXvxl0bdE24iwXlWrIdAy1Q4jf:3yjpLuDIqsf8JBoiXv4IXddj66
Static task
static1
Behavioral task
behavioral1
Sample
80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Targets
-
-
Target
80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b
-
Size
730KB
-
MD5
cb594992778ee446cb4dd8e0f88a1746
-
SHA1
69e8b8e1ff45cd6e7d926d10bbc02b6c93b8dc8d
-
SHA256
80882049def5cbcc3d85e87ec5f4370d2e25a87d6fc8e3129bf98cdb96c0f88b
-
SHA512
10e2510cf4db77cd098aa558ba4a1dec5a0dae969cc211c503fa0cbbded2ce5a010e4daa3140bedc2516427fdf918e7bd108925d5fdfa97991729405d5b394dd
-
SSDEEP
12288:lMriy90lSpoWn77cP53KGvDIwEOswU8J212xoGdXvxl0bdE24iwXlWrIdAy1Q4jf:3yjpLuDIqsf8JBoiXv4IXddj66
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1