General
-
Target
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935
-
Size
689KB
-
Sample
241110-z6dp1svgkj
-
MD5
a234ed005f2f4082febf9a114c087ed2
-
SHA1
470d0751c959f5dc821351ccb9f750faeadbd75e
-
SHA256
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935
-
SHA512
334bc8787264e2f7652ceb800218cad5fa7814fced2b59a174daf96bc4ece4f6d924ff51bab5c43b8b180fe81c6bbe87fa1158815969aef9d0c16df30210b59a
-
SSDEEP
12288:/Mr0y90tuNFCwlBQZw6qOnIUVVm09SspVGlyaqPM43xrYM6KbwxItlf+IpRC1:nyHlBeXqOxmJsDwyX04hUM30xa32
Static task
static1
Behavioral task
behavioral1
Sample
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935
-
Size
689KB
-
MD5
a234ed005f2f4082febf9a114c087ed2
-
SHA1
470d0751c959f5dc821351ccb9f750faeadbd75e
-
SHA256
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935
-
SHA512
334bc8787264e2f7652ceb800218cad5fa7814fced2b59a174daf96bc4ece4f6d924ff51bab5c43b8b180fe81c6bbe87fa1158815969aef9d0c16df30210b59a
-
SSDEEP
12288:/Mr0y90tuNFCwlBQZw6qOnIUVVm09SspVGlyaqPM43xrYM6KbwxItlf+IpRC1:nyHlBeXqOxmJsDwyX04hUM30xa32
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1