General
-
Target
5f8edce89795633121d533b714633b8987b18d0d83071837d541cfa538dc9612
-
Size
779KB
-
Sample
241110-3l8lfazrhn
-
MD5
4344d3490ea417225900efe9e3bf09af
-
SHA1
f3ba43747563fad7decf41bd8c197715d049edca
-
SHA256
5f8edce89795633121d533b714633b8987b18d0d83071837d541cfa538dc9612
-
SHA512
291236acc770ec44bfc99fc6673ff4e61ac1a5f54ef802283e38efbe24c3ee53a1ccfad86bd72ce34af4b52435e11a6c17eb555700186694ea07dd0642701ed4
-
SSDEEP
24576:JyN4i33+C+HfYi57k+EmtYufAIqoDBIV:8N4G+CefYP+EmtYSC
Static task
static1
Behavioral task
behavioral1
Sample
5f8edce89795633121d533b714633b8987b18d0d83071837d541cfa538dc9612.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
5f8edce89795633121d533b714633b8987b18d0d83071837d541cfa538dc9612
-
Size
779KB
-
MD5
4344d3490ea417225900efe9e3bf09af
-
SHA1
f3ba43747563fad7decf41bd8c197715d049edca
-
SHA256
5f8edce89795633121d533b714633b8987b18d0d83071837d541cfa538dc9612
-
SHA512
291236acc770ec44bfc99fc6673ff4e61ac1a5f54ef802283e38efbe24c3ee53a1ccfad86bd72ce34af4b52435e11a6c17eb555700186694ea07dd0642701ed4
-
SSDEEP
24576:JyN4i33+C+HfYi57k+EmtYufAIqoDBIV:8N4G+CefYP+EmtYSC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1