General
-
Target
09a12963555f56317b89e979003e0bddf94833cc5d3a0318a1037f19f5bb2c4a
-
Size
749KB
-
Sample
241109-zd4qqsvkak
-
MD5
dd0cfb3610a6f01758152f7db3783885
-
SHA1
273a07971519d145080f82f2167bbd095edbb7fd
-
SHA256
09a12963555f56317b89e979003e0bddf94833cc5d3a0318a1037f19f5bb2c4a
-
SHA512
528aa0119ed3fb6490574c61b04522a4836ddca14eb1e2b1e07f3bebae17b609813bcacbb58e3adf0eec76419b239ae7c0ef2598743e06ddb4cdff3d794f8465
-
SSDEEP
12288:zMr3y90dVSxe/EVryYd9YqJ990Jrr+qRSoyY+tMLahxdnUB0roAUlX7dmBlrRmpp:8yIV+VNt96rr+zoy1tML4xdPoAMdmHQH
Static task
static1
Behavioral task
behavioral1
Sample
09a12963555f56317b89e979003e0bddf94833cc5d3a0318a1037f19f5bb2c4a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
09a12963555f56317b89e979003e0bddf94833cc5d3a0318a1037f19f5bb2c4a
-
Size
749KB
-
MD5
dd0cfb3610a6f01758152f7db3783885
-
SHA1
273a07971519d145080f82f2167bbd095edbb7fd
-
SHA256
09a12963555f56317b89e979003e0bddf94833cc5d3a0318a1037f19f5bb2c4a
-
SHA512
528aa0119ed3fb6490574c61b04522a4836ddca14eb1e2b1e07f3bebae17b609813bcacbb58e3adf0eec76419b239ae7c0ef2598743e06ddb4cdff3d794f8465
-
SSDEEP
12288:zMr3y90dVSxe/EVryYd9YqJ990Jrr+qRSoyY+tMLahxdnUB0roAUlX7dmBlrRmpp:8yIV+VNt96rr+zoy1tML4xdPoAMdmHQH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1