General
-
Target
3aa6e90ff2f690deca63a865cd19c14903c8ef60d1b42e55d85dd617038fc32c
-
Size
539KB
-
Sample
241109-eat2xazkar
-
MD5
7cae8f63653e6fa63e0a202a16e26705
-
SHA1
ca873367f2eed57c3a90478583b9b5a572bfbcc1
-
SHA256
3aa6e90ff2f690deca63a865cd19c14903c8ef60d1b42e55d85dd617038fc32c
-
SHA512
a5a46aef077bbc636cf6759726777e3702f208c876834fce150c5e049ea63ca7cc6e23fefa2541e9db60a732c5f0b065760141893b81f7de7ca0bfc0c5c8b427
-
SSDEEP
12288:EMrYy90y3Eb5Gv7Ic2B689YdxiI4+b90HAP1KNL:0yVPvh2BD9YPbR0gPoNL
Static task
static1
Behavioral task
behavioral1
Sample
3aa6e90ff2f690deca63a865cd19c14903c8ef60d1b42e55d85dd617038fc32c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
3aa6e90ff2f690deca63a865cd19c14903c8ef60d1b42e55d85dd617038fc32c
-
Size
539KB
-
MD5
7cae8f63653e6fa63e0a202a16e26705
-
SHA1
ca873367f2eed57c3a90478583b9b5a572bfbcc1
-
SHA256
3aa6e90ff2f690deca63a865cd19c14903c8ef60d1b42e55d85dd617038fc32c
-
SHA512
a5a46aef077bbc636cf6759726777e3702f208c876834fce150c5e049ea63ca7cc6e23fefa2541e9db60a732c5f0b065760141893b81f7de7ca0bfc0c5c8b427
-
SSDEEP
12288:EMrYy90y3Eb5Gv7Ic2B689YdxiI4+b90HAP1KNL:0yVPvh2BD9YPbR0gPoNL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1