General
-
Target
01d18ce3e859bd48b85b356bcc709242967126e0bf5470ed489c51052a31a07b
-
Size
479KB
-
Sample
241109-jyq3da1cmg
-
MD5
ef156a99b8defeba0a1daf1e7f434fe8
-
SHA1
cafc54cb937e8374839c65d1661f8f378b1f422c
-
SHA256
01d18ce3e859bd48b85b356bcc709242967126e0bf5470ed489c51052a31a07b
-
SHA512
64cec97f0b29d63b22bd42a16359f1a7d3728ffac24ba63bebcddeab327a51b16b44ae89248d35b6858fb49830ca6c27df3e98bbbc7be34a1ada53f1c7b08b6d
-
SSDEEP
12288:iMrqy90ekd7P9tx5POZZohVvp0wmt9CYqlPPOn8:cyvuPkZomyzlun8
Static task
static1
Behavioral task
behavioral1
Sample
01d18ce3e859bd48b85b356bcc709242967126e0bf5470ed489c51052a31a07b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
01d18ce3e859bd48b85b356bcc709242967126e0bf5470ed489c51052a31a07b
-
Size
479KB
-
MD5
ef156a99b8defeba0a1daf1e7f434fe8
-
SHA1
cafc54cb937e8374839c65d1661f8f378b1f422c
-
SHA256
01d18ce3e859bd48b85b356bcc709242967126e0bf5470ed489c51052a31a07b
-
SHA512
64cec97f0b29d63b22bd42a16359f1a7d3728ffac24ba63bebcddeab327a51b16b44ae89248d35b6858fb49830ca6c27df3e98bbbc7be34a1ada53f1c7b08b6d
-
SSDEEP
12288:iMrqy90ekd7P9tx5POZZohVvp0wmt9CYqlPPOn8:cyvuPkZomyzlun8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1