General
-
Target
a0bfe7cf1c38719a6440de4f51a1ddd77010c24703cbad5fcabd4ca83780ac89
-
Size
478KB
-
Sample
241109-wcz5dayjbs
-
MD5
7f90b63f8b54e68ccba7dc9131412a63
-
SHA1
47431dd8d400987a42826b558c1cea2d06d70ca8
-
SHA256
a0bfe7cf1c38719a6440de4f51a1ddd77010c24703cbad5fcabd4ca83780ac89
-
SHA512
ad4cc9d54459b7c0a476aa5caf304be329ad74ab2fe9f2fa77f5cf5d747ada0c36e4d2ad6e2920478d2910518ee1b4deaf0ce49600d819c71a53e4aa26233959
-
SSDEEP
12288:oMrTy90FfwwSLlqgkLxTj3rbe0row8VwH8Y+M1f:7ysf2KxTj3PeIsVwHLf
Static task
static1
Behavioral task
behavioral1
Sample
a0bfe7cf1c38719a6440de4f51a1ddd77010c24703cbad5fcabd4ca83780ac89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
a0bfe7cf1c38719a6440de4f51a1ddd77010c24703cbad5fcabd4ca83780ac89
-
Size
478KB
-
MD5
7f90b63f8b54e68ccba7dc9131412a63
-
SHA1
47431dd8d400987a42826b558c1cea2d06d70ca8
-
SHA256
a0bfe7cf1c38719a6440de4f51a1ddd77010c24703cbad5fcabd4ca83780ac89
-
SHA512
ad4cc9d54459b7c0a476aa5caf304be329ad74ab2fe9f2fa77f5cf5d747ada0c36e4d2ad6e2920478d2910518ee1b4deaf0ce49600d819c71a53e4aa26233959
-
SSDEEP
12288:oMrTy90FfwwSLlqgkLxTj3rbe0row8VwH8Y+M1f:7ysf2KxTj3PeIsVwHLf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1