General
-
Target
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
Size
539KB
-
Sample
241110-3wtj9sxkh1
-
MD5
092f2e02c114e3343185de3ca6c94b9b
-
SHA1
f20ba641f5d76c20f3144549ef1efedaf297e782
-
SHA256
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
SHA512
e9a9fd40de5f787f483201ef0ded0af87824fdeaef4bd728e8d7f9328aed0efdcc32f344d857019e1027fd708b43054f4627cc02f9c91145728101fb42464173
-
SSDEEP
12288:wMrIy90stdgHPj4Mtzk7+h29GYYxOI4+6CLLU4zl0SgqJjI:oyNq4M9k7+h+GYInJHU9dAjI
Static task
static1
Behavioral task
behavioral1
Sample
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
Size
539KB
-
MD5
092f2e02c114e3343185de3ca6c94b9b
-
SHA1
f20ba641f5d76c20f3144549ef1efedaf297e782
-
SHA256
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
SHA512
e9a9fd40de5f787f483201ef0ded0af87824fdeaef4bd728e8d7f9328aed0efdcc32f344d857019e1027fd708b43054f4627cc02f9c91145728101fb42464173
-
SSDEEP
12288:wMrIy90stdgHPj4Mtzk7+h29GYYxOI4+6CLLU4zl0SgqJjI:oyNq4M9k7+h+GYInJHU9dAjI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1