General
-
Target
09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91
-
Size
992KB
-
Sample
241111-amncnsydng
-
MD5
7cce66c279273f8d7dbd29d20f03817d
-
SHA1
79300f28b97f9a663029d821d76dcc02a59d340d
-
SHA256
09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91
-
SHA512
73fc3cfa5b11d5bb1c91a7b4d53d0e6cdc2a51f2f486903c18b780596994409508cd0c93e3ce926aedde3deb0957b2c1c19889e21739f4fa95ff6157674bc4db
-
SSDEEP
12288:GMrWy90ew8Xq95Pm038RP/ZR0ulXgZgoY2hsZTKskybJ/zTcRwR1TME/I5AvraoT:kyPfy60xgWhe5nbJrTcwMd5Avr5B
Static task
static1
Behavioral task
behavioral1
Sample
09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
diora
185.161.248.75:4132
-
auth_value
4c17e0c4a574a5b11a6e41e692dedcb3
Targets
-
-
Target
09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91
-
Size
992KB
-
MD5
7cce66c279273f8d7dbd29d20f03817d
-
SHA1
79300f28b97f9a663029d821d76dcc02a59d340d
-
SHA256
09a832576763ad06bbf2ad24072b042d29abe6b9793a9145dcc053cd61521f91
-
SHA512
73fc3cfa5b11d5bb1c91a7b4d53d0e6cdc2a51f2f486903c18b780596994409508cd0c93e3ce926aedde3deb0957b2c1c19889e21739f4fa95ff6157674bc4db
-
SSDEEP
12288:GMrWy90ew8Xq95Pm038RP/ZR0ulXgZgoY2hsZTKskybJ/zTcRwR1TME/I5AvraoT:kyPfy60xgWhe5nbJrTcwMd5Avr5B
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-