General
-
Target
0688efbbc0bd8692f39d546be70313bec284714ec0a46eaefe30b0597ca2c478
-
Size
598KB
-
Sample
241110-3psz6axjft
-
MD5
52d00f3532e4ecad1ece257d559a386c
-
SHA1
c9d6c26529603c4a59d1ffd52a2509efb4d928f4
-
SHA256
0688efbbc0bd8692f39d546be70313bec284714ec0a46eaefe30b0597ca2c478
-
SHA512
0b912280940f780fa425c2ec61d82d55c2a2b92b032a28df482973da237f41db51b90ffd5346a1b7083b4790c37857a34b44825ed57727a3cf7d93d15c248f2e
-
SSDEEP
12288:2huzjovqBWB7jqqrp5gks1qUXHSNr/ppbaA2nA54vS:PoyBa2qF5gksj3+In64vS
Static task
static1
Behavioral task
behavioral1
Sample
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c.exe
-
Size
716KB
-
MD5
c919dd4c884ee36c31c7629f582db1dd
-
SHA1
cf0e0258d98f374c9e36883e487fc6853b46dd1f
-
SHA256
9bbf6fbbb2f51f1b0481e5d95a7803d49249326a774c5bd1da1cbe3ea0fb7f5c
-
SHA512
a7a13eabb45ff626a619b00c68df7c99b9b163415815b0c840c901090b59c0efcfbca4614096332918129f9c7775e29200235442c6d3dab431ac87d74e3a1ed8
-
SSDEEP
12288:akQH4MLTHJ9dj9pi/3TtReM4AreTcrrVGU5k7yDpLD5kNS2U/:o4MnHJ9JK3TtReMa8r0U5iyfkNW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1