General
-
Target
2d8a4306fd375d71f40a185566e1392f95da11979370996a6c2c48c071348a69
-
Size
545KB
-
Sample
241110-1qlalayqck
-
MD5
377bc722aa4d8d7b0dbd3f5bce7e91bb
-
SHA1
33851e859006192c37db815641d7e3ba54550b3c
-
SHA256
2d8a4306fd375d71f40a185566e1392f95da11979370996a6c2c48c071348a69
-
SHA512
7b5e56f87036f4deb65f37f5b35b1bea049aa68c68127b5454baefa81f72621060a45e25624622bcd6935f7cc1b8fa1b9a911b7c2eee34d88d93f0a42580826a
-
SSDEEP
12288:WMryy90ICS/ZyveHaeDFW1VYy88+WbRB19zDtyyz:oy9/ye6WFW1VYLWV7j
Static task
static1
Behavioral task
behavioral1
Sample
2d8a4306fd375d71f40a185566e1392f95da11979370996a6c2c48c071348a69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
2d8a4306fd375d71f40a185566e1392f95da11979370996a6c2c48c071348a69
-
Size
545KB
-
MD5
377bc722aa4d8d7b0dbd3f5bce7e91bb
-
SHA1
33851e859006192c37db815641d7e3ba54550b3c
-
SHA256
2d8a4306fd375d71f40a185566e1392f95da11979370996a6c2c48c071348a69
-
SHA512
7b5e56f87036f4deb65f37f5b35b1bea049aa68c68127b5454baefa81f72621060a45e25624622bcd6935f7cc1b8fa1b9a911b7c2eee34d88d93f0a42580826a
-
SSDEEP
12288:WMryy90ICS/ZyveHaeDFW1VYy88+WbRB19zDtyyz:oy9/ye6WFW1VYLWV7j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1