General
-
Target
598767ef01f826f5192835d12a3e9e8c9d3a163f22e4bb9983838c4a64e5c172
-
Size
545KB
-
Sample
241111-a8eyesyhmb
-
MD5
f0fc1e12e9cccb59df757dc31e7fa248
-
SHA1
1f2687bde08f0fa430fc31c6096ce0dd0b575e3d
-
SHA256
598767ef01f826f5192835d12a3e9e8c9d3a163f22e4bb9983838c4a64e5c172
-
SHA512
7bf5d7af103e9e6752fb6e6ee33517df6d740d52f4dff51f6fc60b8d1cb9c768a8eeea7f857312413108386f6fc75d19d97408d08903667b004280a7fd0224a4
-
SSDEEP
12288:aMrYy90bzRCNyiUxGaYCLOSVObN/4DFWOduyPqtrw2ym0syo:2yCzYYiUNYmjcbNMFWOdutrwR8
Static task
static1
Behavioral task
behavioral1
Sample
598767ef01f826f5192835d12a3e9e8c9d3a163f22e4bb9983838c4a64e5c172.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
598767ef01f826f5192835d12a3e9e8c9d3a163f22e4bb9983838c4a64e5c172
-
Size
545KB
-
MD5
f0fc1e12e9cccb59df757dc31e7fa248
-
SHA1
1f2687bde08f0fa430fc31c6096ce0dd0b575e3d
-
SHA256
598767ef01f826f5192835d12a3e9e8c9d3a163f22e4bb9983838c4a64e5c172
-
SHA512
7bf5d7af103e9e6752fb6e6ee33517df6d740d52f4dff51f6fc60b8d1cb9c768a8eeea7f857312413108386f6fc75d19d97408d08903667b004280a7fd0224a4
-
SSDEEP
12288:aMrYy90bzRCNyiUxGaYCLOSVObN/4DFWOduyPqtrw2ym0syo:2yCzYYiUNYmjcbNMFWOdutrwR8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1