General
-
Target
aa0ef8163cb076b3dc28e11262833dbb5221e39287ebe268e99a6217bdbb53de
-
Size
478KB
-
Sample
241111-b1mtqssqck
-
MD5
84e29cdc73344bdf7bd83888a27d5b16
-
SHA1
a2c6f7adb08c8ec2e5e6e19021589fd859e7a4b7
-
SHA256
aa0ef8163cb076b3dc28e11262833dbb5221e39287ebe268e99a6217bdbb53de
-
SHA512
ea00972661d53b7f11e5a2e6de407bb6fd170dc9bc95651ba2e6ef43647763d00add68f29e454568fde41b1aa1ce92504e7b7f5700d8ef38416ecb51cd90c0ab
-
SSDEEP
12288:eMrDy90/WWrH7hvW8DoxRBRkj96oZwz7AI:NyA/vNLj9Ab
Static task
static1
Behavioral task
behavioral1
Sample
aa0ef8163cb076b3dc28e11262833dbb5221e39287ebe268e99a6217bdbb53de.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Targets
-
-
Target
aa0ef8163cb076b3dc28e11262833dbb5221e39287ebe268e99a6217bdbb53de
-
Size
478KB
-
MD5
84e29cdc73344bdf7bd83888a27d5b16
-
SHA1
a2c6f7adb08c8ec2e5e6e19021589fd859e7a4b7
-
SHA256
aa0ef8163cb076b3dc28e11262833dbb5221e39287ebe268e99a6217bdbb53de
-
SHA512
ea00972661d53b7f11e5a2e6de407bb6fd170dc9bc95651ba2e6ef43647763d00add68f29e454568fde41b1aa1ce92504e7b7f5700d8ef38416ecb51cd90c0ab
-
SSDEEP
12288:eMrDy90/WWrH7hvW8DoxRBRkj96oZwz7AI:NyA/vNLj9Ab
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1