General
-
Target
4fff074e5c290733c63799d7ac93fc3ff3556f8c9ab783cca151fa600eedd5fe
-
Size
411KB
-
Sample
241110-2fdnfawgrl
-
MD5
03516190851bd8e7eba1f8d30443377b
-
SHA1
e45cfef20483aec45844976fa888c3f27c9226f2
-
SHA256
4fff074e5c290733c63799d7ac93fc3ff3556f8c9ab783cca151fa600eedd5fe
-
SHA512
403350d5b754af22ac40f08cb5fccd56764aead7a7e5843b70ee9c688072f90733ab9c37b264dd2099e4858d847f166d0ab7541ae9bdfe753fe08c67e27e60a8
-
SSDEEP
12288:bMrEy90yNp7WJOiiz0LMMsNvN9KypB9zFG6psw:jyDNp7WJOiTHszVf3
Static task
static1
Behavioral task
behavioral1
Sample
4fff074e5c290733c63799d7ac93fc3ff3556f8c9ab783cca151fa600eedd5fe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
4fff074e5c290733c63799d7ac93fc3ff3556f8c9ab783cca151fa600eedd5fe
-
Size
411KB
-
MD5
03516190851bd8e7eba1f8d30443377b
-
SHA1
e45cfef20483aec45844976fa888c3f27c9226f2
-
SHA256
4fff074e5c290733c63799d7ac93fc3ff3556f8c9ab783cca151fa600eedd5fe
-
SHA512
403350d5b754af22ac40f08cb5fccd56764aead7a7e5843b70ee9c688072f90733ab9c37b264dd2099e4858d847f166d0ab7541ae9bdfe753fe08c67e27e60a8
-
SSDEEP
12288:bMrEy90yNp7WJOiiz0LMMsNvN9KypB9zFG6psw:jyDNp7WJOiTHszVf3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1