General
-
Target
a62998cbb56da75690390e52d23e91ac435472d2c4e0695ced9722ccd4de2ec3
-
Size
836KB
-
Sample
241110-bqsbgawenq
-
MD5
57de69d38651700a47109ec3e0fafd43
-
SHA1
0383d84d7138ec7b6cd9e7b1ce5bc980fa3c83a6
-
SHA256
a62998cbb56da75690390e52d23e91ac435472d2c4e0695ced9722ccd4de2ec3
-
SHA512
3900e80bb23912da9fc1e98641a82e47688321f123c6e397b1805c2945ca9bbd59d31e52f91b1ef9bae978201b253a177ab2ad60965c0d1ba8f3541540cc2359
-
SSDEEP
24576:ayIHQ7stPufaVRBvar28+VPWl27ate5T:hF7sto6PZVWuIe5
Static task
static1
Behavioral task
behavioral1
Sample
a62998cbb56da75690390e52d23e91ac435472d2c4e0695ced9722ccd4de2ec3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
a62998cbb56da75690390e52d23e91ac435472d2c4e0695ced9722ccd4de2ec3
-
Size
836KB
-
MD5
57de69d38651700a47109ec3e0fafd43
-
SHA1
0383d84d7138ec7b6cd9e7b1ce5bc980fa3c83a6
-
SHA256
a62998cbb56da75690390e52d23e91ac435472d2c4e0695ced9722ccd4de2ec3
-
SHA512
3900e80bb23912da9fc1e98641a82e47688321f123c6e397b1805c2945ca9bbd59d31e52f91b1ef9bae978201b253a177ab2ad60965c0d1ba8f3541540cc2359
-
SSDEEP
24576:ayIHQ7stPufaVRBvar28+VPWl27ate5T:hF7sto6PZVWuIe5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1