General
-
Target
963032c72c8d021bb62c2e33091b67bd6c77328630c4bcb889cd0007b6299c82
-
Size
666KB
-
Sample
241110-1yfp3swhjc
-
MD5
3a6a54d98fdc382c47a9b3b0664cd652
-
SHA1
fca7000c10da958e4b19127f757d39d2c2be44a1
-
SHA256
963032c72c8d021bb62c2e33091b67bd6c77328630c4bcb889cd0007b6299c82
-
SHA512
eb1c0236b1d946017182e361aede13ccd2bf82ef822561d9033c1816c58bd8df80767c178fe0c10bd1bcd4ac87cad329cef8186c5a6bf7955d70b3ada1ce4a74
-
SSDEEP
12288:ZMr8y909Qpz7ucaP9ssELhDCXdG75k4RbPo19mR3X6NzPvB3ArPISYdqoDQ6:9yOQB72P9mlodG75FA1k3wLB3Arb6
Static task
static1
Behavioral task
behavioral1
Sample
963032c72c8d021bb62c2e33091b67bd6c77328630c4bcb889cd0007b6299c82.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
963032c72c8d021bb62c2e33091b67bd6c77328630c4bcb889cd0007b6299c82
-
Size
666KB
-
MD5
3a6a54d98fdc382c47a9b3b0664cd652
-
SHA1
fca7000c10da958e4b19127f757d39d2c2be44a1
-
SHA256
963032c72c8d021bb62c2e33091b67bd6c77328630c4bcb889cd0007b6299c82
-
SHA512
eb1c0236b1d946017182e361aede13ccd2bf82ef822561d9033c1816c58bd8df80767c178fe0c10bd1bcd4ac87cad329cef8186c5a6bf7955d70b3ada1ce4a74
-
SSDEEP
12288:ZMr8y909Qpz7ucaP9ssELhDCXdG75k4RbPo19mR3X6NzPvB3ArPISYdqoDQ6:9yOQB72P9mlodG75FA1k3wLB3Arb6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1