General
-
Target
70b48c858d0b79042cd002f66c12d718e977f4d8f675ce31d3e145dea54f7afe
-
Size
479KB
-
Sample
241110-1ggwtawdkf
-
MD5
847893b8c194c1540a97f093218e3d5f
-
SHA1
eba53cccbde31766a2bd92a076a749f3bb6ab168
-
SHA256
70b48c858d0b79042cd002f66c12d718e977f4d8f675ce31d3e145dea54f7afe
-
SHA512
f7d6578e97513412f27630793dd6384189eee9982433afc624d3ce33c5a5756ab57f8fdbfce67f9d5cfbb3a39ac082f3aa137bc77a3f9630c89fce819c1fd1c6
-
SSDEEP
12288:QMrKy90D3sgLA07C6rEd7PT7SEzHVpC8NK05hpze:KygpL7e6YNdHnhNe
Static task
static1
Behavioral task
behavioral1
Sample
70b48c858d0b79042cd002f66c12d718e977f4d8f675ce31d3e145dea54f7afe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Targets
-
-
Target
70b48c858d0b79042cd002f66c12d718e977f4d8f675ce31d3e145dea54f7afe
-
Size
479KB
-
MD5
847893b8c194c1540a97f093218e3d5f
-
SHA1
eba53cccbde31766a2bd92a076a749f3bb6ab168
-
SHA256
70b48c858d0b79042cd002f66c12d718e977f4d8f675ce31d3e145dea54f7afe
-
SHA512
f7d6578e97513412f27630793dd6384189eee9982433afc624d3ce33c5a5756ab57f8fdbfce67f9d5cfbb3a39ac082f3aa137bc77a3f9630c89fce819c1fd1c6
-
SSDEEP
12288:QMrKy90D3sgLA07C6rEd7PT7SEzHVpC8NK05hpze:KygpL7e6YNdHnhNe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1