General
-
Target
6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d
-
Size
836KB
-
Sample
241111-ad5wcsybre
-
MD5
9ce6d84d73447699e902be2d4d64723b
-
SHA1
04b8b048b539e71df5d072b61e5c0f9ec04c7e65
-
SHA256
6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d
-
SHA512
e7c8a8972ef57450bd2bf1f453af1fdffb00ecde1129f46feea5cef67d44ecd6f7372d67ee4b3e0544537f8edc9b40758ae718c096866bd2fc52cc0594aa881e
-
SSDEEP
12288:wMr9y90iI6vnoqbbzLEngkzvwEpxx5SDbuBXsR37Mn3OvOjzsAiIBSzCIR51AdKj:dyeEL70vpVqWsRk3XzdiRxREKj
Static task
static1
Behavioral task
behavioral1
Sample
6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d
-
Size
836KB
-
MD5
9ce6d84d73447699e902be2d4d64723b
-
SHA1
04b8b048b539e71df5d072b61e5c0f9ec04c7e65
-
SHA256
6a7f43ab318e5b18f877accb28b2a26607c8dac82eed67e6169c966b3b208d0d
-
SHA512
e7c8a8972ef57450bd2bf1f453af1fdffb00ecde1129f46feea5cef67d44ecd6f7372d67ee4b3e0544537f8edc9b40758ae718c096866bd2fc52cc0594aa881e
-
SSDEEP
12288:wMr9y90iI6vnoqbbzLEngkzvwEpxx5SDbuBXsR37Mn3OvOjzsAiIBSzCIR51AdKj:dyeEL70vpVqWsRk3XzdiRxREKj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1