General
-
Target
5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161
-
Size
1.2MB
-
Sample
241109-zespvssaml
-
MD5
9f2dd96857d07329f6d1e59c339a54a7
-
SHA1
9a35438f62ca4800ffeb399d850b5230d70f29e0
-
SHA256
5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161
-
SHA512
72944a7618688b031b9148c55ae4ea0075c6b6f03e313825a552b9dda12854df79c4740d22542263a3da468977819b5a9a44872da6accea414b39906ae098450
-
SSDEEP
24576:pyVOHXKgcCKJvQR9YhM0JXm598A+Lv4gCQOsdnEvDe7:cVuX9cC4I9I+8AiSkdEb
Static task
static1
Behavioral task
behavioral1
Sample
5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161
-
Size
1.2MB
-
MD5
9f2dd96857d07329f6d1e59c339a54a7
-
SHA1
9a35438f62ca4800ffeb399d850b5230d70f29e0
-
SHA256
5bc5fae1095adbc05b701fa98991c3c1dde4efcbcb433516283f4badc089f161
-
SHA512
72944a7618688b031b9148c55ae4ea0075c6b6f03e313825a552b9dda12854df79c4740d22542263a3da468977819b5a9a44872da6accea414b39906ae098450
-
SSDEEP
24576:pyVOHXKgcCKJvQR9YhM0JXm598A+Lv4gCQOsdnEvDe7:cVuX9cC4I9I+8AiSkdEb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-