General
-
Target
0b29af7b35f7acb70a21d61853c92afe9f0f2ba0ea2a10c6a117ca187265558f
-
Size
479KB
-
Sample
241110-3raats1jgl
-
MD5
b670764003b82870d02e840d64178194
-
SHA1
300bebcb14acee14a9b95cde4b73138a3994959c
-
SHA256
0b29af7b35f7acb70a21d61853c92afe9f0f2ba0ea2a10c6a117ca187265558f
-
SHA512
19ac4edb3a6ca58e27e286bf3d3037d804b55c676ffb9c953703cd4908d6ada246e5af315030fc4af9ba63854b165346ee22900679e09b6cb3d49c81db69eebb
-
SSDEEP
12288:nMrMy90DAeUYHnPQEKKjtEs61spCj3A1dklDwT:zyFkrKKDO+eDwT
Static task
static1
Behavioral task
behavioral1
Sample
0b29af7b35f7acb70a21d61853c92afe9f0f2ba0ea2a10c6a117ca187265558f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Targets
-
-
Target
0b29af7b35f7acb70a21d61853c92afe9f0f2ba0ea2a10c6a117ca187265558f
-
Size
479KB
-
MD5
b670764003b82870d02e840d64178194
-
SHA1
300bebcb14acee14a9b95cde4b73138a3994959c
-
SHA256
0b29af7b35f7acb70a21d61853c92afe9f0f2ba0ea2a10c6a117ca187265558f
-
SHA512
19ac4edb3a6ca58e27e286bf3d3037d804b55c676ffb9c953703cd4908d6ada246e5af315030fc4af9ba63854b165346ee22900679e09b6cb3d49c81db69eebb
-
SSDEEP
12288:nMrMy90DAeUYHnPQEKKjtEs61spCj3A1dklDwT:zyFkrKKDO+eDwT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1