General
-
Target
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c
-
Size
1.1MB
-
Sample
241111-a3ds6sydkr
-
MD5
8eccd2643432ff758fafadbcad46f662
-
SHA1
12f7c9ad8aaaf272e7acbbbdc980d258b44b53f4
-
SHA256
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c
-
SHA512
234058892091d3725e4aa4665fbc80af34e55f62d9752a7f78005de97d99f883772eca5b5925ea30e09c1186704957f54d88fa80126d63908e3309d45360e573
-
SSDEEP
12288:hMr05y90LTyzvOyfyfppMI4UWPPk6ind29aB/ga9Rll0SFxXOElaPLnQGBVB3CCq:/5yWslipkUTYEIHS7O42bVhTFs
Static task
static1
Behavioral task
behavioral1
Sample
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c
-
Size
1.1MB
-
MD5
8eccd2643432ff758fafadbcad46f662
-
SHA1
12f7c9ad8aaaf272e7acbbbdc980d258b44b53f4
-
SHA256
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c
-
SHA512
234058892091d3725e4aa4665fbc80af34e55f62d9752a7f78005de97d99f883772eca5b5925ea30e09c1186704957f54d88fa80126d63908e3309d45360e573
-
SSDEEP
12288:hMr05y90LTyzvOyfyfppMI4UWPPk6ind29aB/ga9Rll0SFxXOElaPLnQGBVB3CCq:/5yWslipkUTYEIHS7O42bVhTFs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1