General
-
Target
9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824
-
Size
478KB
-
Sample
241111-ayx19ayfpb
-
MD5
84c3ce4230728107705651538e1176ad
-
SHA1
c09f8e9a0426b1eefeb349c10c0daf0f3ab18a35
-
SHA256
9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824
-
SHA512
01cb2c3467513f46b504d319de936e2ca461535971526403ea59fb10c36e82e43b00c18beba7df8734c3110c154c9f415273f28311b73e35f8fb4aabfa237d85
-
SSDEEP
12288:zMryy90GcCRunrvK3oHKon68L7GwSKyUhEHxFo8b:Ryv9ADtnf7GLRHP9b
Static task
static1
Behavioral task
behavioral1
Sample
9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Targets
-
-
Target
9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824
-
Size
478KB
-
MD5
84c3ce4230728107705651538e1176ad
-
SHA1
c09f8e9a0426b1eefeb349c10c0daf0f3ab18a35
-
SHA256
9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824
-
SHA512
01cb2c3467513f46b504d319de936e2ca461535971526403ea59fb10c36e82e43b00c18beba7df8734c3110c154c9f415273f28311b73e35f8fb4aabfa237d85
-
SSDEEP
12288:zMryy90GcCRunrvK3oHKon68L7GwSKyUhEHxFo8b:Ryv9ADtnf7GLRHP9b
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1