General
-
Target
04b77a8d86871bbd2b33529803c891fc9562cc4e0b9821c195ba3d1fa65f50ef
-
Size
540KB
-
Sample
241110-1ylakawjcs
-
MD5
44d921f827c5fe0b0aa90230a3b328fb
-
SHA1
c09d956533e7f9fd2c214e4940e56531322e4ab0
-
SHA256
04b77a8d86871bbd2b33529803c891fc9562cc4e0b9821c195ba3d1fa65f50ef
-
SHA512
e0f880fb77fa763b556350d74f0f198f38456b195f2c00f4eaf39d235d03047a0a0093c0b763eb55f5991f3c3939a8f50f2260ee878e5f9fd698ec40e8d5e162
-
SSDEEP
12288:YMrey90Uj7qQFp3qw/ET9eLT588R4KOScHceCp6Q:myV3qwu9eLTq8RrO0Vj
Static task
static1
Behavioral task
behavioral1
Sample
04b77a8d86871bbd2b33529803c891fc9562cc4e0b9821c195ba3d1fa65f50ef.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
04b77a8d86871bbd2b33529803c891fc9562cc4e0b9821c195ba3d1fa65f50ef
-
Size
540KB
-
MD5
44d921f827c5fe0b0aa90230a3b328fb
-
SHA1
c09d956533e7f9fd2c214e4940e56531322e4ab0
-
SHA256
04b77a8d86871bbd2b33529803c891fc9562cc4e0b9821c195ba3d1fa65f50ef
-
SHA512
e0f880fb77fa763b556350d74f0f198f38456b195f2c00f4eaf39d235d03047a0a0093c0b763eb55f5991f3c3939a8f50f2260ee878e5f9fd698ec40e8d5e162
-
SSDEEP
12288:YMrey90Uj7qQFp3qw/ET9eLT588R4KOScHceCp6Q:myV3qwu9eLTq8RrO0Vj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1