General
-
Target
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d
-
Size
479KB
-
Sample
241110-17k16awlas
-
MD5
6db0a782f894f25ceecffe88768b39ac
-
SHA1
aec479646d5910d6650e1a42c298839e86d9f359
-
SHA256
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d
-
SHA512
adea3d90ced418823837aeda81359e1c7b85974de5ce0091d5b9ee7284c26fd53f8efd4c49e1f3ae3d4fd911b6d949cc17295232659333acf3cef005b1b71621
-
SSDEEP
12288:BMr3y90jQyTQ0qy1dE5wcEimBY5Do4m9:qyAQZ0i1K
Static task
static1
Behavioral task
behavioral1
Sample
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d
-
Size
479KB
-
MD5
6db0a782f894f25ceecffe88768b39ac
-
SHA1
aec479646d5910d6650e1a42c298839e86d9f359
-
SHA256
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d
-
SHA512
adea3d90ced418823837aeda81359e1c7b85974de5ce0091d5b9ee7284c26fd53f8efd4c49e1f3ae3d4fd911b6d949cc17295232659333acf3cef005b1b71621
-
SSDEEP
12288:BMr3y90jQyTQ0qy1dE5wcEimBY5Do4m9:qyAQZ0i1K
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1