General
-
Target
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182
-
Size
663KB
-
Sample
241111-a1rl9aygjb
-
MD5
f64931b0d1bf85fc55d60247a4461fed
-
SHA1
312afe989275e223455bddc29f69a5fd3b2d6c7e
-
SHA256
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182
-
SHA512
2badc01f42975618f497e0602845bc6ec708db606623122ce847f6f4eb714b3c097cc3bc57fa1053030071dae8b804669f46e5af95eba36188a485a0cb4934e2
-
SSDEEP
12288:EMrmy90HxnumGsApiHfIQtlrL1+k6c/rOo4jKUISOwdvmkyi8Blo+Q:yyIjAp2p4k6AkLvmkyi8Po+Q
Static task
static1
Behavioral task
behavioral1
Sample
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182
-
Size
663KB
-
MD5
f64931b0d1bf85fc55d60247a4461fed
-
SHA1
312afe989275e223455bddc29f69a5fd3b2d6c7e
-
SHA256
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182
-
SHA512
2badc01f42975618f497e0602845bc6ec708db606623122ce847f6f4eb714b3c097cc3bc57fa1053030071dae8b804669f46e5af95eba36188a485a0cb4934e2
-
SSDEEP
12288:EMrmy90HxnumGsApiHfIQtlrL1+k6c/rOo4jKUISOwdvmkyi8Blo+Q:yyIjAp2p4k6AkLvmkyi8Po+Q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1