General
-
Target
ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c
-
Size
753KB
-
Sample
241109-j5wans1dml
-
MD5
0c829d1227b8c27668d133b64b9bf1a7
-
SHA1
946a6eb9f3084ada59422f73c7561b52fbe38c61
-
SHA256
ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c
-
SHA512
4718efa5068000936bbf8133d7123b7f6191765e63f21b971a2dcfa4ede82b7e051cffdcc65dc6a8900e4ba4fc853a1ada99e7d1c928c783f5f2a85bcb733f15
-
SSDEEP
12288:AMrBy90MHAVit02tnnQJ/0ROPY/z9SKBeHZRCUJUes47Mj67QfQ7k:xySgttB+RASKBKBiL44jfQ7k
Static task
static1
Behavioral task
behavioral1
Sample
ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Targets
-
-
Target
ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c
-
Size
753KB
-
MD5
0c829d1227b8c27668d133b64b9bf1a7
-
SHA1
946a6eb9f3084ada59422f73c7561b52fbe38c61
-
SHA256
ff907f5e7f9d0d034a752329c2424dca7fc33f8de3a29965b407940014f1751c
-
SHA512
4718efa5068000936bbf8133d7123b7f6191765e63f21b971a2dcfa4ede82b7e051cffdcc65dc6a8900e4ba4fc853a1ada99e7d1c928c783f5f2a85bcb733f15
-
SSDEEP
12288:AMrBy90MHAVit02tnnQJ/0ROPY/z9SKBeHZRCUJUes47Mj67QfQ7k:xySgttB+RASKBKBiL44jfQ7k
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1