General
-
Target
4939acc5788245a8f4f001a13359fca9cfb84a496679cb2afb12e757e5a16cd1
-
Size
682KB
-
Sample
241110-16n2eswflq
-
MD5
75c4c78128b3b41822c8b02c2b4937a8
-
SHA1
da93343b6b705a133a571e789efa5bb054a6086e
-
SHA256
4939acc5788245a8f4f001a13359fca9cfb84a496679cb2afb12e757e5a16cd1
-
SHA512
d6fb99399f62a63df2bce2e6d5ca27e73e849b1ef35689b047f31efda89d80ed417a22c26c4e1283f97e16f469b45b4d3bb80de5f15a802ee5314f2565bf60b9
-
SSDEEP
12288:CMrsy90ptEKGGFZYNUpJrXUzCEAh4UII5VbTKMJvQqfhtpcBE8EeI:qyc+8ZoU7XBh4UII3buiQ4fpcBED
Static task
static1
Behavioral task
behavioral1
Sample
4939acc5788245a8f4f001a13359fca9cfb84a496679cb2afb12e757e5a16cd1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
4939acc5788245a8f4f001a13359fca9cfb84a496679cb2afb12e757e5a16cd1
-
Size
682KB
-
MD5
75c4c78128b3b41822c8b02c2b4937a8
-
SHA1
da93343b6b705a133a571e789efa5bb054a6086e
-
SHA256
4939acc5788245a8f4f001a13359fca9cfb84a496679cb2afb12e757e5a16cd1
-
SHA512
d6fb99399f62a63df2bce2e6d5ca27e73e849b1ef35689b047f31efda89d80ed417a22c26c4e1283f97e16f469b45b4d3bb80de5f15a802ee5314f2565bf60b9
-
SSDEEP
12288:CMrsy90ptEKGGFZYNUpJrXUzCEAh4UII5VbTKMJvQqfhtpcBE8EeI:qyc+8ZoU7XBh4UII3buiQ4fpcBED
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1