General
-
Target
7ed382cbe89663cb75e551654235403777b61469691d09994dd9da306a4c515c
-
Size
705KB
-
Sample
241111-a4welssjar
-
MD5
44380d761fade6abb4fb4e4f88b91b27
-
SHA1
9094a5fc47942d0d6a9fa557b7ac8fc3c78d810a
-
SHA256
7ed382cbe89663cb75e551654235403777b61469691d09994dd9da306a4c515c
-
SHA512
9980ea60cb962d2c462e3f071094d4770ecb71c327e8f35dc8d9da8ac4166a5a74f0d2d1a059aa23b2a64519b03a0b0254ea4c76997758f8a09788ca7ae3d18e
-
SSDEEP
12288:nMrvy90CxFnTfyRc8OviSbED16+QdVxf8K5nmEsM0fuNEZfzCPQkYWCiM2308:8yDxRTqRcXi3D16+qVp8K9uM0fu6Z7Eh
Static task
static1
Behavioral task
behavioral1
Sample
7ed382cbe89663cb75e551654235403777b61469691d09994dd9da306a4c515c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
7ed382cbe89663cb75e551654235403777b61469691d09994dd9da306a4c515c
-
Size
705KB
-
MD5
44380d761fade6abb4fb4e4f88b91b27
-
SHA1
9094a5fc47942d0d6a9fa557b7ac8fc3c78d810a
-
SHA256
7ed382cbe89663cb75e551654235403777b61469691d09994dd9da306a4c515c
-
SHA512
9980ea60cb962d2c462e3f071094d4770ecb71c327e8f35dc8d9da8ac4166a5a74f0d2d1a059aa23b2a64519b03a0b0254ea4c76997758f8a09788ca7ae3d18e
-
SSDEEP
12288:nMrvy90CxFnTfyRc8OviSbED16+QdVxf8K5nmEsM0fuNEZfzCPQkYWCiM2308:8yDxRTqRcXi3D16+qVp8K9uM0fu6Z7Eh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1