General
-
Target
f9c7fb61fac796511a98f115056b62cd9a93f0575008d2f3e04adc57c83fdee5
-
Size
538KB
-
Sample
241110-z9bd3avmgv
-
MD5
305fcf62dddb78bb174ea9085f6aa4e0
-
SHA1
ee28b8c3925710f6db2cf1deaeab87635756e6ed
-
SHA256
f9c7fb61fac796511a98f115056b62cd9a93f0575008d2f3e04adc57c83fdee5
-
SHA512
46d7dc75bbe75561a3a2368793db9b459ef666eca81d2c8bfe3913737cfffdd8602255abd5ce3b35b8c3558685d9447ec0920297d9b7c27b0921f9778272ff99
-
SSDEEP
12288:EMrjy90SGnrZjYi0Xd022G/eK+AwYp1M9Cs9qshaX:3ywrJEXdjbdnp1QCqfM
Static task
static1
Behavioral task
behavioral1
Sample
f9c7fb61fac796511a98f115056b62cd9a93f0575008d2f3e04adc57c83fdee5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
f9c7fb61fac796511a98f115056b62cd9a93f0575008d2f3e04adc57c83fdee5
-
Size
538KB
-
MD5
305fcf62dddb78bb174ea9085f6aa4e0
-
SHA1
ee28b8c3925710f6db2cf1deaeab87635756e6ed
-
SHA256
f9c7fb61fac796511a98f115056b62cd9a93f0575008d2f3e04adc57c83fdee5
-
SHA512
46d7dc75bbe75561a3a2368793db9b459ef666eca81d2c8bfe3913737cfffdd8602255abd5ce3b35b8c3558685d9447ec0920297d9b7c27b0921f9778272ff99
-
SSDEEP
12288:EMrjy90SGnrZjYi0Xd022G/eK+AwYp1M9Cs9qshaX:3ywrJEXdjbdnp1QCqfM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1