General
-
Target
e9e1e02a9520d30a0db0c6496f36475579fec528e7a4f6aac65d41b5aff2df89
-
Size
1.5MB
-
Sample
241110-mrpgravepq
-
MD5
26adc053b87baa0b6ae4425d9180c6f2
-
SHA1
e0c74264a0515adb507499b05d6e5ffaab3e2dc6
-
SHA256
e9e1e02a9520d30a0db0c6496f36475579fec528e7a4f6aac65d41b5aff2df89
-
SHA512
0bec1085819f2063af86e7f0d38a2114e5bd10534cc7dc8a791a925ce0611e773a0c6d850c7ca773e6f8c485bae43e4d88fa272957c864fa7d88755da953e16c
-
SSDEEP
49152:GABfH6PCysDJTVkJOBsKquuM2E8pusAjwV:TlRTKJ3luufcju
Static task
static1
Behavioral task
behavioral1
Sample
e9e1e02a9520d30a0db0c6496f36475579fec528e7a4f6aac65d41b5aff2df89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
e9e1e02a9520d30a0db0c6496f36475579fec528e7a4f6aac65d41b5aff2df89
-
Size
1.5MB
-
MD5
26adc053b87baa0b6ae4425d9180c6f2
-
SHA1
e0c74264a0515adb507499b05d6e5ffaab3e2dc6
-
SHA256
e9e1e02a9520d30a0db0c6496f36475579fec528e7a4f6aac65d41b5aff2df89
-
SHA512
0bec1085819f2063af86e7f0d38a2114e5bd10534cc7dc8a791a925ce0611e773a0c6d850c7ca773e6f8c485bae43e4d88fa272957c864fa7d88755da953e16c
-
SSDEEP
49152:GABfH6PCysDJTVkJOBsKquuM2E8pusAjwV:TlRTKJ3luufcju
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1