General
-
Target
20ea8234f3919c554e51b3dacf2b238ba5e46c2fee3208a848b52f17895906c1
-
Size
544KB
-
Sample
241110-1wyg4swdjr
-
MD5
a95cb70ac32c010cc0fee3ad1be4d837
-
SHA1
a82a033bb243266e07dce73d22414e513ce07581
-
SHA256
20ea8234f3919c554e51b3dacf2b238ba5e46c2fee3208a848b52f17895906c1
-
SHA512
ab514c7f4e457e2e7f65959dcee85c6692c60f38502420b8c12e093e16f0c9dcb5b764c40cb07b49a1b73d118b760bcfd02f08900024fe37a45eb680161a8352
-
SSDEEP
12288:RMrfy90Jxymisbe+V55NTPbQ5VPNdEQF81+13RvBr:ayCymij+V5bqVPNdTFkSPr
Static task
static1
Behavioral task
behavioral1
Sample
20ea8234f3919c554e51b3dacf2b238ba5e46c2fee3208a848b52f17895906c1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
20ea8234f3919c554e51b3dacf2b238ba5e46c2fee3208a848b52f17895906c1
-
Size
544KB
-
MD5
a95cb70ac32c010cc0fee3ad1be4d837
-
SHA1
a82a033bb243266e07dce73d22414e513ce07581
-
SHA256
20ea8234f3919c554e51b3dacf2b238ba5e46c2fee3208a848b52f17895906c1
-
SHA512
ab514c7f4e457e2e7f65959dcee85c6692c60f38502420b8c12e093e16f0c9dcb5b764c40cb07b49a1b73d118b760bcfd02f08900024fe37a45eb680161a8352
-
SSDEEP
12288:RMrfy90Jxymisbe+V55NTPbQ5VPNdEQF81+13RvBr:ayCymij+V5bqVPNdTFkSPr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1