General
-
Target
6c1a115cb242ef59ce048ce6b2bc95f2db85f6f8a721d22ed486a4c9f3c12901
-
Size
479KB
-
Sample
241110-3wytzsyalf
-
MD5
3da7bcc40b223fa15d9e37b01fbc98d1
-
SHA1
2ecc5c320087dabcbd9ecc1ae3b5750deb85b520
-
SHA256
6c1a115cb242ef59ce048ce6b2bc95f2db85f6f8a721d22ed486a4c9f3c12901
-
SHA512
0c3594f2e759c942f18265885d963c2a87394459076c54c4e283bd3300e4073f3b0882b4cdf3e1611b27fd25d5bd8f4dcfc25fc393abe54b60d43710066e7d55
-
SSDEEP
12288:0MrYy900cdElvp4n43FvX+yaXFsWyGXnEB7:sylcME430zPXEB7
Static task
static1
Behavioral task
behavioral1
Sample
6c1a115cb242ef59ce048ce6b2bc95f2db85f6f8a721d22ed486a4c9f3c12901.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Targets
-
-
Target
6c1a115cb242ef59ce048ce6b2bc95f2db85f6f8a721d22ed486a4c9f3c12901
-
Size
479KB
-
MD5
3da7bcc40b223fa15d9e37b01fbc98d1
-
SHA1
2ecc5c320087dabcbd9ecc1ae3b5750deb85b520
-
SHA256
6c1a115cb242ef59ce048ce6b2bc95f2db85f6f8a721d22ed486a4c9f3c12901
-
SHA512
0c3594f2e759c942f18265885d963c2a87394459076c54c4e283bd3300e4073f3b0882b4cdf3e1611b27fd25d5bd8f4dcfc25fc393abe54b60d43710066e7d55
-
SSDEEP
12288:0MrYy900cdElvp4n43FvX+yaXFsWyGXnEB7:sylcME430zPXEB7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1