General
-
Target
e1f3010cbd9c2130385fbc32c1d4635afad819906d83df839666337122c9b77d
-
Size
598KB
-
Sample
241110-2dq6raxbqe
-
MD5
3a94dce015f1e4c812fe03af993bec92
-
SHA1
88fec5580fd2a4a50bcf272f40b232250c224773
-
SHA256
e1f3010cbd9c2130385fbc32c1d4635afad819906d83df839666337122c9b77d
-
SHA512
23597561d5f60ed543688ba20b49360ab4ac5add29b67a410e90d67d063736ab84d25c6f425dcc11d5a0a3e68b561358047459e13203f812692086deaeca1d5a
-
SSDEEP
12288:UKm1NL3Ocs9H9eYsjwWUnK4C047+R5gEceV+E+ux0BzhgzU:UKmz+dwHjwWF4tO5eVkuq/gw
Static task
static1
Behavioral task
behavioral1
Sample
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
-
Size
716KB
-
MD5
c919dd4c884ee36c31c7629f582db1dd
-
SHA1
cf0e0258d98f374c9e36883e487fc6853b46dd1f
-
SHA256
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c
-
SHA512
a7a13eabb45ff626a619b00c68df7c99b9b163415815b0c840c901090b59c0efcfbca4614096332918129f9c7775e29200235442c6d3dab431ac87d74e3a1ed8
-
SSDEEP
12288:akQH4MLTHJ9dj9pi/3TtReM4AreTcrrVGU5k7yDpLD5kNS2U/:o4MnHJ9JK3TtReMa8r0U5iyfkNW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1