General
-
Target
15ff8149c53b8f98ecd34be297312c1f752e6b3d6a50359ded235086353b2020
-
Size
479KB
-
Sample
241110-1x3hfsyrhn
-
MD5
cf3159d8b8388ff6e4784ab68395f4c1
-
SHA1
01e4d4f7d8729fef912cb6d6a116e1b66d05028e
-
SHA256
15ff8149c53b8f98ecd34be297312c1f752e6b3d6a50359ded235086353b2020
-
SHA512
75daa3ac204215b50931782f0e9606d66cdf577eecbef01c585b5146cc91739fc47c8c2e0bc4a91842dd799634835bb896b2ccd20f2ee18905e3ab94c03cb712
-
SSDEEP
12288:YMrqy90bt2sU5S00C0dJLAad3iRNxfpJ:Cy2jUR0ndJLAa5iRNd
Static task
static1
Behavioral task
behavioral1
Sample
15ff8149c53b8f98ecd34be297312c1f752e6b3d6a50359ded235086353b2020.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Targets
-
-
Target
15ff8149c53b8f98ecd34be297312c1f752e6b3d6a50359ded235086353b2020
-
Size
479KB
-
MD5
cf3159d8b8388ff6e4784ab68395f4c1
-
SHA1
01e4d4f7d8729fef912cb6d6a116e1b66d05028e
-
SHA256
15ff8149c53b8f98ecd34be297312c1f752e6b3d6a50359ded235086353b2020
-
SHA512
75daa3ac204215b50931782f0e9606d66cdf577eecbef01c585b5146cc91739fc47c8c2e0bc4a91842dd799634835bb896b2ccd20f2ee18905e3ab94c03cb712
-
SSDEEP
12288:YMrqy90bt2sU5S00C0dJLAad3iRNxfpJ:Cy2jUR0ndJLAa5iRNd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1