General
-
Target
03ff4e3f997c1f69dde8d9b0e356baa96b0f8eb46c3113e101c145be64de5433
-
Size
1.5MB
-
Sample
241111-acfj3s1mcp
-
MD5
8868324231f6c1d29b9870c688ee9ceb
-
SHA1
b22e3bbad5460877583d758e0f83e52a728766a0
-
SHA256
03ff4e3f997c1f69dde8d9b0e356baa96b0f8eb46c3113e101c145be64de5433
-
SHA512
5b73cf24831fd0570b3180c45ecd6cb4596a42a26d20ead2ca57caa6210d60fe83f5c8143c6a23e07622f66a35dc4ad2c6c95b882c60a5082653dc39020a6463
-
SSDEEP
49152:vWvkjZshJ/lrzIeOfVX9oTJPdHFghDom:uYAJ/hUtXEPQD
Static task
static1
Behavioral task
behavioral1
Sample
03ff4e3f997c1f69dde8d9b0e356baa96b0f8eb46c3113e101c145be64de5433.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
03ff4e3f997c1f69dde8d9b0e356baa96b0f8eb46c3113e101c145be64de5433
-
Size
1.5MB
-
MD5
8868324231f6c1d29b9870c688ee9ceb
-
SHA1
b22e3bbad5460877583d758e0f83e52a728766a0
-
SHA256
03ff4e3f997c1f69dde8d9b0e356baa96b0f8eb46c3113e101c145be64de5433
-
SHA512
5b73cf24831fd0570b3180c45ecd6cb4596a42a26d20ead2ca57caa6210d60fe83f5c8143c6a23e07622f66a35dc4ad2c6c95b882c60a5082653dc39020a6463
-
SSDEEP
49152:vWvkjZshJ/lrzIeOfVX9oTJPdHFghDom:uYAJ/hUtXEPQD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1