General
-
Target
4f25ccc7579a98b3168e05b7b046904fdfa68093895c8fa95c567f28df8e9c71
-
Size
993KB
-
Sample
241110-2c27mazlhj
-
MD5
ba120be22f4f3a6527070ab5466ba3cd
-
SHA1
2587bf145333a4df2e68f82659921f959716d222
-
SHA256
4f25ccc7579a98b3168e05b7b046904fdfa68093895c8fa95c567f28df8e9c71
-
SHA512
ebb9a666fbd62cd14940a77642751ed3c13fcc938e91032fe114a455001d358c7dfdbb21b903c88e785e213e367a557fcffe4b9b53f7b88f0e89b9c3fce0f0f8
-
SSDEEP
24576:8y9bv7aP+3XgW5lgFnBbYWlu8AM2INLUo3MHfADQ5kAGAK:r9bv7aP+gW5mR9FwFoUyJK
Static task
static1
Behavioral task
behavioral1
Sample
4f25ccc7579a98b3168e05b7b046904fdfa68093895c8fa95c567f28df8e9c71.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diora
185.161.248.75:4132
-
auth_value
4c17e0c4a574a5b11a6e41e692dedcb3
Targets
-
-
Target
4f25ccc7579a98b3168e05b7b046904fdfa68093895c8fa95c567f28df8e9c71
-
Size
993KB
-
MD5
ba120be22f4f3a6527070ab5466ba3cd
-
SHA1
2587bf145333a4df2e68f82659921f959716d222
-
SHA256
4f25ccc7579a98b3168e05b7b046904fdfa68093895c8fa95c567f28df8e9c71
-
SHA512
ebb9a666fbd62cd14940a77642751ed3c13fcc938e91032fe114a455001d358c7dfdbb21b903c88e785e213e367a557fcffe4b9b53f7b88f0e89b9c3fce0f0f8
-
SSDEEP
24576:8y9bv7aP+3XgW5lgFnBbYWlu8AM2INLUo3MHfADQ5kAGAK:r9bv7aP+gW5mR9FwFoUyJK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-