General
-
Target
dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91
-
Size
479KB
-
Sample
241110-3kypvaxdqn
-
MD5
6c9ef6b2dfa3cd1fca9d546791c77457
-
SHA1
5603b22c3b031a539bc8011b94d0a973aa21c12d
-
SHA256
dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91
-
SHA512
80e6edc7468b74bb869de475b394c3f6ca8c626e6b959dec77dda628bcd602053da06ec7483602ea6b1bf2b686ce2e348f24a11a04a35687455522c1ab035566
-
SSDEEP
12288:jMr1y90pUt43ti5c1u31kTgjRQ6aIXXv4tl8zyOBufn:eyqO8IXWTK5Qt3OBe
Static task
static1
Behavioral task
behavioral1
Sample
dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Targets
-
-
Target
dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91
-
Size
479KB
-
MD5
6c9ef6b2dfa3cd1fca9d546791c77457
-
SHA1
5603b22c3b031a539bc8011b94d0a973aa21c12d
-
SHA256
dae8677f88824e370213d688e0047ff32436c503f230d23e94164f4d84538f91
-
SHA512
80e6edc7468b74bb869de475b394c3f6ca8c626e6b959dec77dda628bcd602053da06ec7483602ea6b1bf2b686ce2e348f24a11a04a35687455522c1ab035566
-
SSDEEP
12288:jMr1y90pUt43ti5c1u31kTgjRQ6aIXXv4tl8zyOBufn:eyqO8IXWTK5Qt3OBe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1