General
-
Target
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0
-
Size
909KB
-
Sample
241110-1yjrqszjam
-
MD5
cf95db7127f3e69fa4aaa44a2b368ac1
-
SHA1
b766e6cee7c310610fb8fad749492762ff882103
-
SHA256
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0
-
SHA512
f58e122188bf67a7c39b4192ebac861fdeaa57375e6a90d4a5aa8d186224c550c48ef8350411e31f718a7e285ed9da99e3088fb2ce84d20c4f0b6de845e176c9
-
SSDEEP
12288:QMrZy90nyMVo+7nlnvFnh0VBWzLecl5n3/M3PCAEGCHTkYzTjFY/Pnzb/mrWZ:Zy6yMV/5h02zKcl5nvMCXHQWFqn3Ory
Static task
static1
Behavioral task
behavioral1
Sample
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0
-
Size
909KB
-
MD5
cf95db7127f3e69fa4aaa44a2b368ac1
-
SHA1
b766e6cee7c310610fb8fad749492762ff882103
-
SHA256
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0
-
SHA512
f58e122188bf67a7c39b4192ebac861fdeaa57375e6a90d4a5aa8d186224c550c48ef8350411e31f718a7e285ed9da99e3088fb2ce84d20c4f0b6de845e176c9
-
SSDEEP
12288:QMrZy90nyMVo+7nlnvFnh0VBWzLecl5n3/M3PCAEGCHTkYzTjFY/Pnzb/mrWZ:Zy6yMV/5h02zKcl5nvMCXHQWFqn3Ory
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1