General
-
Target
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1
-
Size
1.2MB
-
Sample
241111-aeq4la1mgj
-
MD5
53a070900e667e0074cecf5cc4ce38c7
-
SHA1
bd8b4d49822801726e5ba987fa33dfaa3e3bcc81
-
SHA256
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1
-
SHA512
cdeee7ecb4ca6a3950f517dbaec21d967c39fbbbe91df290226512d31eab7a1a4bb033fbb75619e1b6c32b34e8b4943202e95d10e054086a151a52a046b99196
-
SSDEEP
24576:N9h9DPt4hMaYTFBwZRvrtKJk5vZssiYQbrAfUPR:N/9D14dYTP85rtZ5TT4Af
Static task
static1
Behavioral task
behavioral1
Sample
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1
-
Size
1.2MB
-
MD5
53a070900e667e0074cecf5cc4ce38c7
-
SHA1
bd8b4d49822801726e5ba987fa33dfaa3e3bcc81
-
SHA256
74127bf44f0570955401edda801cae311af896b9395d8da7d5b952d8b4fa75b1
-
SHA512
cdeee7ecb4ca6a3950f517dbaec21d967c39fbbbe91df290226512d31eab7a1a4bb033fbb75619e1b6c32b34e8b4943202e95d10e054086a151a52a046b99196
-
SSDEEP
24576:N9h9DPt4hMaYTFBwZRvrtKJk5vZssiYQbrAfUPR:N/9D14dYTP85rtZ5TT4Af
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1