General
-
Target
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c
-
Size
1.1MB
-
Sample
241111-atx6fsyeqa
-
MD5
f64a6adf41132b401af77f1e4a08f310
-
SHA1
751b24df2f918e5b683f1cf3c40a79fd59e4a044
-
SHA256
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c
-
SHA512
09c5cccb8130f606c11b8e450028dcef9e720ddd852fbac0e9e58c28ad170de988d9d7b30b176ef49371812840a4f9aeb37ca6663c6dcf4fe29baacfc942bc96
-
SSDEEP
24576:HyAliJVw+6fUxoAA6f/TcFPmeZKNh1KxyDUaJ8o+DQ3klbzelVK+:SVJ++sUh8KLz1JwF2VK
Static task
static1
Behavioral task
behavioral1
Sample
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c
-
Size
1.1MB
-
MD5
f64a6adf41132b401af77f1e4a08f310
-
SHA1
751b24df2f918e5b683f1cf3c40a79fd59e4a044
-
SHA256
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c
-
SHA512
09c5cccb8130f606c11b8e450028dcef9e720ddd852fbac0e9e58c28ad170de988d9d7b30b176ef49371812840a4f9aeb37ca6663c6dcf4fe29baacfc942bc96
-
SSDEEP
24576:HyAliJVw+6fUxoAA6f/TcFPmeZKNh1KxyDUaJ8o+DQ3klbzelVK+:SVJ++sUh8KLz1JwF2VK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1