General
-
Target
4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111
-
Size
192KB
-
Sample
241110-3h6bxaxgja
-
MD5
2fd9225d8a3166e1ec355ca1c50e4c3f
-
SHA1
b3b82e1c236a938e6435d38e4c87fb6e0c90ec60
-
SHA256
4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111
-
SHA512
ebca82ef548c0213faf87e1074bb39b8a66c39396556546f6272eb7cbae51d3a86fbfd2eb4a5851871ed4f0867a952b53154fcfa3f57938d94a2f92f35c2ec65
-
SSDEEP
3072:KNy+bnr+O1X5GWp1icKAArDZz4N9GhbkrNEk1OTEqTuBppc2Fro7:KNy+bnr+Ep0yN90QE/6BrhK
Static task
static1
Behavioral task
behavioral1
Sample
4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111
-
Size
192KB
-
MD5
2fd9225d8a3166e1ec355ca1c50e4c3f
-
SHA1
b3b82e1c236a938e6435d38e4c87fb6e0c90ec60
-
SHA256
4583dbfbe17cd79823999a1110438cfd5f1da2199ab5769fb5fd5e0c347c1111
-
SHA512
ebca82ef548c0213faf87e1074bb39b8a66c39396556546f6272eb7cbae51d3a86fbfd2eb4a5851871ed4f0867a952b53154fcfa3f57938d94a2f92f35c2ec65
-
SSDEEP
3072:KNy+bnr+O1X5GWp1icKAArDZz4N9GhbkrNEk1OTEqTuBppc2Fro7:KNy+bnr+Ep0yN90QE/6BrhK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1