General
-
Target
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879
-
Size
479KB
-
Sample
241110-eqacfaynex
-
MD5
cfaf31599f1dfc3d7b11e8051a8bd7a1
-
SHA1
dabbf9b7183d18868836d54072e66cab2bafcddc
-
SHA256
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879
-
SHA512
c441680ee31264eb8df10855ab040530b64849c76b54fb73a3c7e4c998d26096b6b33cf16bc49c6ebc9c50a09ed47a73106f0a6019061407c07a00b5a9bcbbc0
-
SSDEEP
12288:VMrky90pQ8iDnnUK1EdPnORU6pxoPXnWbV:tyYQz3OuvoPXW5
Static task
static1
Behavioral task
behavioral1
Sample
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879
-
Size
479KB
-
MD5
cfaf31599f1dfc3d7b11e8051a8bd7a1
-
SHA1
dabbf9b7183d18868836d54072e66cab2bafcddc
-
SHA256
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879
-
SHA512
c441680ee31264eb8df10855ab040530b64849c76b54fb73a3c7e4c998d26096b6b33cf16bc49c6ebc9c50a09ed47a73106f0a6019061407c07a00b5a9bcbbc0
-
SSDEEP
12288:VMrky90pQ8iDnnUK1EdPnORU6pxoPXnWbV:tyYQz3OuvoPXW5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1