General
-
Target
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897
-
Size
481KB
-
Sample
241111-akrmbaydkc
-
MD5
38d57e10b67fe30c6c3147eb71875a19
-
SHA1
55323f67468cb22f6aab48f77c836a6476e18352
-
SHA256
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897
-
SHA512
fdef86d3cf86bc07ea7239cc5e2e96ce9be096251b04a7ec719aba16bd9dd00dd476c2fd5819ed6ed1e4e5ec5e1f2959b859930c1ec0520a30302633595647c4
-
SSDEEP
12288:XMr3y90ilbYaL5zD+uzb2Wrs6L6IvHW64B5sjDE:cypLx+umos6L6Ivx4B5sM
Static task
static1
Behavioral task
behavioral1
Sample
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Targets
-
-
Target
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897
-
Size
481KB
-
MD5
38d57e10b67fe30c6c3147eb71875a19
-
SHA1
55323f67468cb22f6aab48f77c836a6476e18352
-
SHA256
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897
-
SHA512
fdef86d3cf86bc07ea7239cc5e2e96ce9be096251b04a7ec719aba16bd9dd00dd476c2fd5819ed6ed1e4e5ec5e1f2959b859930c1ec0520a30302633595647c4
-
SSDEEP
12288:XMr3y90ilbYaL5zD+uzb2Wrs6L6IvHW64B5sjDE:cypLx+umos6L6Ivx4B5sM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1