General
-
Target
d9e76240f506f3d73a80cc45cb09ea0c919c32bc12abb7b72829497eb4558c89
-
Size
602KB
-
Sample
241110-1gpawsvhrq
-
MD5
bc6c573e6765563f983ad1eae8741751
-
SHA1
cd4f929be65e13c47d38ddf7a9e7bfc4c7a4ab88
-
SHA256
d9e76240f506f3d73a80cc45cb09ea0c919c32bc12abb7b72829497eb4558c89
-
SHA512
20a0e2af7f170467664e7ff56989d785eea1be38392038781eee14eceae679cba03038e25406c954ff1536eaae37e1ca8e51cbce1633cf9b0551b0f3d502d1c7
-
SSDEEP
12288:4rUKwCrXcgzZ6esNAOzTQArdRl9OYgPLAe5fhGmkYsgq+41aF8gR/seP7:4rwCrXZyZ4w/jOYgPLAe5Tqv1aF7pT
Static task
static1
Behavioral task
behavioral1
Sample
5eeb2d8ddc1e9aa67712087465d8cf5be99a3c648e4f408c9521a81f7b1013a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5eeb2d8ddc1e9aa67712087465d8cf5be99a3c648e4f408c9521a81f7b1013a9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
5eeb2d8ddc1e9aa67712087465d8cf5be99a3c648e4f408c9521a81f7b1013a9.exe
-
Size
723KB
-
MD5
d3f9cb3ea71ea8e5908bad2a6952815c
-
SHA1
42bc1a0e06bc5b2bfbd4689072fddb2e8aff8de0
-
SHA256
5eeb2d8ddc1e9aa67712087465d8cf5be99a3c648e4f408c9521a81f7b1013a9
-
SHA512
4d7c8cd11a6f9504b640b93d8381c5cf0ed407e68a45fa6f9da1f2d1d8f8610ba0270c9240f37c60222f795d2b9fec64920b6a68541bc565459bac38a44fdef8
-
SSDEEP
12288:sPHlKPGwVTTl9OHeVLZWsV5PRkKwLDxY8krRdq72FVxPwt6qQ6TjD:alKPVTl9IeVdt9RkMdd9JwTn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1