General
-
Target
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93
-
Size
1.1MB
-
Sample
241110-3lmnzazrgm
-
MD5
a576820e07ff80e5c97fed10f147945e
-
SHA1
93eaba624efbbaad1a990fa596752b72531209b7
-
SHA256
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93
-
SHA512
a66a2b69f2adf81ce506529768737250eee99409ff290f4be1b663e3aeef9be266ac291ad9d7f91a371e6948a07e323dbc431f979ecb525cc81b6eb19200cddb
-
SSDEEP
24576:zylkV/UyGb+HFSOwvRYRm9YD4pWO8rgkFwmr5NEBJuOfKd2:Ga52aHFSCZDKWOaVfEBJuoKd
Static task
static1
Behavioral task
behavioral1
Sample
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rodik
193.233.20.23:4124
-
auth_value
59b6e22e7cfd9b5fa0c99d1942f7c85d
Targets
-
-
Target
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93
-
Size
1.1MB
-
MD5
a576820e07ff80e5c97fed10f147945e
-
SHA1
93eaba624efbbaad1a990fa596752b72531209b7
-
SHA256
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93
-
SHA512
a66a2b69f2adf81ce506529768737250eee99409ff290f4be1b663e3aeef9be266ac291ad9d7f91a371e6948a07e323dbc431f979ecb525cc81b6eb19200cddb
-
SSDEEP
24576:zylkV/UyGb+HFSOwvRYRm9YD4pWO8rgkFwmr5NEBJuOfKd2:Ga52aHFSCZDKWOaVfEBJuoKd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1