General
-
Target
f48fb20e1c03e43d8f6a15ea19c7c68ed8db76e33aec337844356952a6116629
-
Size
1.0MB
-
Sample
241111-a8xs8syjbw
-
MD5
eeea0a90038e81baa82ea9703215e0de
-
SHA1
65cca7f8f75d0ce8d92e29f742144b9ca7f0d087
-
SHA256
f48fb20e1c03e43d8f6a15ea19c7c68ed8db76e33aec337844356952a6116629
-
SHA512
494447b864c5f8be5042697dcc487fa49d61035ff79d720b1cfb9239367148b7439d4a9529dc1e4c1abe25659fb4311e33435c27ce0652aaf071e880906571dc
-
SSDEEP
24576:oy6VRzHSlVvirSYNPBlkXrPuDtdUJWXhi1KDdl6N:v6/ulVdQMXqxdUgXOKDd4
Static task
static1
Behavioral task
behavioral1
Sample
f48fb20e1c03e43d8f6a15ea19c7c68ed8db76e33aec337844356952a6116629.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
f48fb20e1c03e43d8f6a15ea19c7c68ed8db76e33aec337844356952a6116629
-
Size
1.0MB
-
MD5
eeea0a90038e81baa82ea9703215e0de
-
SHA1
65cca7f8f75d0ce8d92e29f742144b9ca7f0d087
-
SHA256
f48fb20e1c03e43d8f6a15ea19c7c68ed8db76e33aec337844356952a6116629
-
SHA512
494447b864c5f8be5042697dcc487fa49d61035ff79d720b1cfb9239367148b7439d4a9529dc1e4c1abe25659fb4311e33435c27ce0652aaf071e880906571dc
-
SSDEEP
24576:oy6VRzHSlVvirSYNPBlkXrPuDtdUJWXhi1KDdl6N:v6/ulVdQMXqxdUgXOKDd4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1