General
-
Target
35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64
-
Size
545KB
-
Sample
241110-3qm6as1jfn
-
MD5
eb1d4d53e116d5c067bb6ba2745ff193
-
SHA1
e1628c79abe41d32321d7308daff8ebb566ffb64
-
SHA256
35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64
-
SHA512
6a00994804f37908fbd067763e7d6d3a7ca6d0c167d48b4517338fd4e653d2672e36b955b9bf643c900a11d36eb374a1d9e60f961f12edc030d0cc2c0ba63ad9
-
SSDEEP
6144:Kny+bnr+op0yN90QE5MoDFpp4INo9bjFQAdmTb4IhU/B9jQ03ChgsFkKPWtdZOlw:ZMr4y90AyHejC5m9kcCxFXPWtUl0HGU
Static task
static1
Behavioral task
behavioral1
Sample
35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Targets
-
-
Target
35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64
-
Size
545KB
-
MD5
eb1d4d53e116d5c067bb6ba2745ff193
-
SHA1
e1628c79abe41d32321d7308daff8ebb566ffb64
-
SHA256
35696732147b71881b7922d1d3d951332b9c4371a70e9341814d89dc58517b64
-
SHA512
6a00994804f37908fbd067763e7d6d3a7ca6d0c167d48b4517338fd4e653d2672e36b955b9bf643c900a11d36eb374a1d9e60f961f12edc030d0cc2c0ba63ad9
-
SSDEEP
6144:Kny+bnr+op0yN90QE5MoDFpp4INo9bjFQAdmTb4IhU/B9jQ03ChgsFkKPWtdZOlw:ZMr4y90AyHejC5m9kcCxFXPWtUl0HGU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1