General
-
Target
9a146383ac5d7c05585b9649e710f9c9d00ea3912935d4d920d921bd77a93977
-
Size
545KB
-
Sample
241110-1643mswfmm
-
MD5
7215375fcad0efb4e1e023f2350d73f9
-
SHA1
64dfa1ace50e1e0afca2d2b8c9d804aa8bcde653
-
SHA256
9a146383ac5d7c05585b9649e710f9c9d00ea3912935d4d920d921bd77a93977
-
SHA512
10642397e7ac1fc546737c86d14315f94c1cdc01f51ffb2d240a8629c0c4c12e71e3b0b494c04b29af4390683d08a0305bcdaf0064f119d046e092dd736d4cb2
-
SSDEEP
12288:fMr6y90HO+UihXkVObbRzQFWvqjxm5lm3q0iK7:5yX+ZhXkcbbWFWvqjg5lWh7
Static task
static1
Behavioral task
behavioral1
Sample
9a146383ac5d7c05585b9649e710f9c9d00ea3912935d4d920d921bd77a93977.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
9a146383ac5d7c05585b9649e710f9c9d00ea3912935d4d920d921bd77a93977
-
Size
545KB
-
MD5
7215375fcad0efb4e1e023f2350d73f9
-
SHA1
64dfa1ace50e1e0afca2d2b8c9d804aa8bcde653
-
SHA256
9a146383ac5d7c05585b9649e710f9c9d00ea3912935d4d920d921bd77a93977
-
SHA512
10642397e7ac1fc546737c86d14315f94c1cdc01f51ffb2d240a8629c0c4c12e71e3b0b494c04b29af4390683d08a0305bcdaf0064f119d046e092dd736d4cb2
-
SSDEEP
12288:fMr6y90HO+UihXkVObbRzQFWvqjxm5lm3q0iK7:5yX+ZhXkcbbWFWvqjg5lWh7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1