General
-
Target
9ed31d5d2db6eb28f036351237b2f66b8b3e923d3447154124d4c1e99a848cdb
-
Size
481KB
-
Sample
241111-a78t4syhlg
-
MD5
43a029235ce80dc464763b570eb01024
-
SHA1
8acbcb38cc593278383a8bfba9749521f458dd86
-
SHA256
9ed31d5d2db6eb28f036351237b2f66b8b3e923d3447154124d4c1e99a848cdb
-
SHA512
6139c6a0ecde82fb843165b11f4db709a076283939b6a01c7c66838d52a95b58cc9070ff7ac0e97ad11123288de387e876c1047074d44990aa97afeeb11484ca
-
SSDEEP
12288:VMr0y90lZ92B6g0p+H7FJPYAHXMXnV9tdL:1yqw0p+bFJAGXSVZL
Static task
static1
Behavioral task
behavioral1
Sample
9ed31d5d2db6eb28f036351237b2f66b8b3e923d3447154124d4c1e99a848cdb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
9ed31d5d2db6eb28f036351237b2f66b8b3e923d3447154124d4c1e99a848cdb
-
Size
481KB
-
MD5
43a029235ce80dc464763b570eb01024
-
SHA1
8acbcb38cc593278383a8bfba9749521f458dd86
-
SHA256
9ed31d5d2db6eb28f036351237b2f66b8b3e923d3447154124d4c1e99a848cdb
-
SHA512
6139c6a0ecde82fb843165b11f4db709a076283939b6a01c7c66838d52a95b58cc9070ff7ac0e97ad11123288de387e876c1047074d44990aa97afeeb11484ca
-
SSDEEP
12288:VMr0y90lZ92B6g0p+H7FJPYAHXMXnV9tdL:1yqw0p+bFJAGXSVZL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1