General
-
Target
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110
-
Size
689KB
-
Sample
241111-avjpfsyerf
-
MD5
700933c6eb87116776d0b3d3f61d7e4a
-
SHA1
d84bc8bc70d1d7490bdc2ce7c0dce3f4ab6c0bdf
-
SHA256
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110
-
SHA512
a91d27214e5f31e8982013905163cd7a6bb213f4745b47125287b26b0d7d0292bb30022784f96d96700687da442c5a2b22ce3f0e6555f07d0447f14f4903cb4c
-
SSDEEP
12288:kMrgy90WXmWGrDgjlRWfkLljj8Mjdt+TYekLYxUVNtMrlWtV/Nqvg:EyBGrSRWfkLKMjyY1LtfiQD
Static task
static1
Behavioral task
behavioral1
Sample
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110
-
Size
689KB
-
MD5
700933c6eb87116776d0b3d3f61d7e4a
-
SHA1
d84bc8bc70d1d7490bdc2ce7c0dce3f4ab6c0bdf
-
SHA256
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110
-
SHA512
a91d27214e5f31e8982013905163cd7a6bb213f4745b47125287b26b0d7d0292bb30022784f96d96700687da442c5a2b22ce3f0e6555f07d0447f14f4903cb4c
-
SSDEEP
12288:kMrgy90WXmWGrDgjlRWfkLljj8Mjdt+TYekLYxUVNtMrlWtV/Nqvg:EyBGrSRWfkLKMjyY1LtfiQD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1