General
-
Target
7584b8b7702458dafb853c12016141bba955a21332657500a2ef682e97da36ef
-
Size
404KB
-
Sample
241110-3z92esybke
-
MD5
24d131f208e732f9aec3ae0e0bb45222
-
SHA1
d380817db209e869bd346cdb828057f2f3ea1791
-
SHA256
7584b8b7702458dafb853c12016141bba955a21332657500a2ef682e97da36ef
-
SHA512
5a589357d3ce295bdad4a46787ae8a80cedf1444b35cb4186a6b9d67213b2aff6f3ca7b759d42b3475e88961e93085afc79f4afd1312567053eca243c6020f89
-
SSDEEP
6144:NFp0yN90QEd0qZ5mJ87JaJt+F2W2eeQ1ZnvOhmKEACYpmK2N0AFUjNHMqxaAM:2y90Yqbx2NQ1lcoACYEbYHJM
Static task
static1
Behavioral task
behavioral1
Sample
7584b8b7702458dafb853c12016141bba955a21332657500a2ef682e97da36ef.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Targets
-
-
Target
7584b8b7702458dafb853c12016141bba955a21332657500a2ef682e97da36ef
-
Size
404KB
-
MD5
24d131f208e732f9aec3ae0e0bb45222
-
SHA1
d380817db209e869bd346cdb828057f2f3ea1791
-
SHA256
7584b8b7702458dafb853c12016141bba955a21332657500a2ef682e97da36ef
-
SHA512
5a589357d3ce295bdad4a46787ae8a80cedf1444b35cb4186a6b9d67213b2aff6f3ca7b759d42b3475e88961e93085afc79f4afd1312567053eca243c6020f89
-
SSDEEP
6144:NFp0yN90QEd0qZ5mJ87JaJt+F2W2eeQ1ZnvOhmKEACYpmK2N0AFUjNHMqxaAM:2y90Yqbx2NQ1lcoACYEbYHJM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1