General
-
Target
0bbecb09781fedd846184db23cd621e9100ae672a80d2691386c2a42bdba554d
-
Size
540KB
-
Sample
241110-3pl7lsxgre
-
MD5
4cf2c71ca7f399fc351dbd26133f1dbb
-
SHA1
314f539d21faa3e43c9fb19f1d64addbac6a2e49
-
SHA256
0bbecb09781fedd846184db23cd621e9100ae672a80d2691386c2a42bdba554d
-
SHA512
0d9a83b23ab650239e30383d51d840a4170e182f619a9b36018ef1a92dc00fef8adce2f5f6a878ef5aee53dc155e2a0d33240ec079e5570b1f4c9a07b9372408
-
SSDEEP
12288:5Mrmy90zbqlHI1an8inMIzI6MGV7K8gdqE3F:ry+Z1dizIdGVeVdj1
Static task
static1
Behavioral task
behavioral1
Sample
0bbecb09781fedd846184db23cd621e9100ae672a80d2691386c2a42bdba554d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
0bbecb09781fedd846184db23cd621e9100ae672a80d2691386c2a42bdba554d
-
Size
540KB
-
MD5
4cf2c71ca7f399fc351dbd26133f1dbb
-
SHA1
314f539d21faa3e43c9fb19f1d64addbac6a2e49
-
SHA256
0bbecb09781fedd846184db23cd621e9100ae672a80d2691386c2a42bdba554d
-
SHA512
0d9a83b23ab650239e30383d51d840a4170e182f619a9b36018ef1a92dc00fef8adce2f5f6a878ef5aee53dc155e2a0d33240ec079e5570b1f4c9a07b9372408
-
SSDEEP
12288:5Mrmy90zbqlHI1an8inMIzI6MGV7K8gdqE3F:ry+Z1dizIdGVeVdj1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1