General
-
Target
7a031c2c6c94812cb93c730fae8d79c7cb0719e2f28c1409ea0b708423e5957d
-
Size
479KB
-
Sample
241110-3zdm8axldy
-
MD5
bd8afbd3024ab2eb900a20605afafe93
-
SHA1
7fa2a0c23417b2f53283f53e9b55fbfff6e5124d
-
SHA256
7a031c2c6c94812cb93c730fae8d79c7cb0719e2f28c1409ea0b708423e5957d
-
SHA512
875e25afab1cba745e06175a13d4733fda3700111306d1364b454e2ff887b7e30b5480a307f845ea5f2505c987e0ea6a9d274b3e33ce523700961e1b2823df9f
-
SSDEEP
12288:3Mrvy907oa8b2bhYzhyANIFMjpC0500+C+ZN:Aypb2gISVLoZN
Static task
static1
Behavioral task
behavioral1
Sample
7a031c2c6c94812cb93c730fae8d79c7cb0719e2f28c1409ea0b708423e5957d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Targets
-
-
Target
7a031c2c6c94812cb93c730fae8d79c7cb0719e2f28c1409ea0b708423e5957d
-
Size
479KB
-
MD5
bd8afbd3024ab2eb900a20605afafe93
-
SHA1
7fa2a0c23417b2f53283f53e9b55fbfff6e5124d
-
SHA256
7a031c2c6c94812cb93c730fae8d79c7cb0719e2f28c1409ea0b708423e5957d
-
SHA512
875e25afab1cba745e06175a13d4733fda3700111306d1364b454e2ff887b7e30b5480a307f845ea5f2505c987e0ea6a9d274b3e33ce523700961e1b2823df9f
-
SSDEEP
12288:3Mrvy907oa8b2bhYzhyANIFMjpC0500+C+ZN:Aypb2gISVLoZN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1