General
-
Target
1bddb22668d9cd4106ceeb39e98b78057ccbaaec1a9c730a7c9acba244751d65
-
Size
479KB
-
Sample
241109-jgeb9atjfm
-
MD5
e8130ec8706aa9fed8e4df14b861c912
-
SHA1
502fe379b9b2b179541d656bc8621a586f88ae49
-
SHA256
1bddb22668d9cd4106ceeb39e98b78057ccbaaec1a9c730a7c9acba244751d65
-
SHA512
07d8b1267bd89b205a91a79117ac49fb541d8b75c4f60d4db016d12939432e6fc56313c047a8ed7b9bd414cca1e350936c61c328b2340b91f5c2c33be3dac726
-
SSDEEP
12288:OMr6y90eVbT20az7LtQ12NIek/bxytxvtTzWkN:4yfVbThY7LtQwTQN4vBT
Static task
static1
Behavioral task
behavioral1
Sample
1bddb22668d9cd4106ceeb39e98b78057ccbaaec1a9c730a7c9acba244751d65.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
1bddb22668d9cd4106ceeb39e98b78057ccbaaec1a9c730a7c9acba244751d65
-
Size
479KB
-
MD5
e8130ec8706aa9fed8e4df14b861c912
-
SHA1
502fe379b9b2b179541d656bc8621a586f88ae49
-
SHA256
1bddb22668d9cd4106ceeb39e98b78057ccbaaec1a9c730a7c9acba244751d65
-
SHA512
07d8b1267bd89b205a91a79117ac49fb541d8b75c4f60d4db016d12939432e6fc56313c047a8ed7b9bd414cca1e350936c61c328b2340b91f5c2c33be3dac726
-
SSDEEP
12288:OMr6y90eVbT20az7LtQ12NIek/bxytxvtTzWkN:4yfVbThY7LtQwTQN4vBT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1