General
-
Target
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf
-
Size
974KB
-
Sample
241110-3v7qhaxfpl
-
MD5
e383859975f044fd4bc9efaff8ef1a0d
-
SHA1
e7c0b827f75f1e91d88164e4b85ef58b622f7fe5
-
SHA256
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf
-
SHA512
c2d68dfcc97fd77b1a477aac2e114ab36a9ef10c2febd35aa1af65425ea6e43b239719baa3a8722405f544f1d910ccf429936459ecb7d31fb8ffa14b68a3ecb1
-
SSDEEP
24576:oyzNV9j29B0juCZOA/FoHAgrtUEgu4Ir6rqt7zaG:vBH29B0juCZHbgxku4Iraqtna
Static task
static1
Behavioral task
behavioral1
Sample
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Targets
-
-
Target
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf
-
Size
974KB
-
MD5
e383859975f044fd4bc9efaff8ef1a0d
-
SHA1
e7c0b827f75f1e91d88164e4b85ef58b622f7fe5
-
SHA256
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf
-
SHA512
c2d68dfcc97fd77b1a477aac2e114ab36a9ef10c2febd35aa1af65425ea6e43b239719baa3a8722405f544f1d910ccf429936459ecb7d31fb8ffa14b68a3ecb1
-
SSDEEP
24576:oyzNV9j29B0juCZOA/FoHAgrtUEgu4Ir6rqt7zaG:vBH29B0juCZHbgxku4Iraqtna
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1