General
-
Target
460effda6a6c6e07b2eae4541d1e09761ae4cbb90e82b36888b7229236ebcba2
-
Size
479KB
-
Sample
241110-mjb7fsvdlk
-
MD5
8ff7e445e6ce97f24e2a5896142db94a
-
SHA1
7d14d7e344aa79d0a8f498d3efa7ebf2a12f4611
-
SHA256
460effda6a6c6e07b2eae4541d1e09761ae4cbb90e82b36888b7229236ebcba2
-
SHA512
5048b0ab3972cd4384ed8a8bf4a5d17d6acfaf7d408570692f5afbba5d0837557021ec9d891316834b26c6c7ed07f8741abe7ebedb81d8daddceb763b35cb383
-
SSDEEP
12288:oMrey90LkVuBxwnnPTOiGFryv2PfOQSorOeeB6:WyJVuBinPTO1FrLfOQdruU
Static task
static1
Behavioral task
behavioral1
Sample
460effda6a6c6e07b2eae4541d1e09761ae4cbb90e82b36888b7229236ebcba2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
460effda6a6c6e07b2eae4541d1e09761ae4cbb90e82b36888b7229236ebcba2
-
Size
479KB
-
MD5
8ff7e445e6ce97f24e2a5896142db94a
-
SHA1
7d14d7e344aa79d0a8f498d3efa7ebf2a12f4611
-
SHA256
460effda6a6c6e07b2eae4541d1e09761ae4cbb90e82b36888b7229236ebcba2
-
SHA512
5048b0ab3972cd4384ed8a8bf4a5d17d6acfaf7d408570692f5afbba5d0837557021ec9d891316834b26c6c7ed07f8741abe7ebedb81d8daddceb763b35cb383
-
SSDEEP
12288:oMrey90LkVuBxwnnPTOiGFryv2PfOQSorOeeB6:WyJVuBinPTO1FrLfOQdruU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1