General
-
Target
6d99e0ca910bb96c869c7891c176b0981e788050a566be99f96754defde72752
-
Size
1.1MB
-
Sample
241111-b2kqrsynhx
-
MD5
dc6b6e0080bb24fe33d648f197fb2a78
-
SHA1
805ce935fc3dbccdfe52a573cd7834d312ecbefe
-
SHA256
6d99e0ca910bb96c869c7891c176b0981e788050a566be99f96754defde72752
-
SHA512
eba9694684dddb6a3e8a7e01a990746a5fe3266715f5f85c140cec3d257cf1d93c4f66b48f3c43a1d54a162f81af6bedc925bf9a455d42b3798ce3fe7e61d70f
-
SSDEEP
24576:kYe/N/Z9804J4vk0IBlXNWpvaYfey3/DFXcumDnvdwqXRb9yC7qQBJkZ/:klne9J4lIBlydfta7DVzBbP7qRR
Static task
static1
Behavioral task
behavioral1
Sample
a29573b5e0e6f884f977c917c9674ccf232c8b0cdbfe6cc60d2623b8a4b27139.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a29573b5e0e6f884f977c917c9674ccf232c8b0cdbfe6cc60d2623b8a4b27139.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
a29573b5e0e6f884f977c917c9674ccf232c8b0cdbfe6cc60d2623b8a4b27139.exe
-
Size
1.2MB
-
MD5
b8a0bd01dd33a56227eae69e83b2ab89
-
SHA1
441ad1d5a5b1d47f9bc67cc178f3497a14bc68ba
-
SHA256
a29573b5e0e6f884f977c917c9674ccf232c8b0cdbfe6cc60d2623b8a4b27139
-
SHA512
0e6101846983deea6616d24f43898532ec9e436a98e9ac8713c8282780a28ed0b80fd0d984202383f1c6445f8aa79c267d241b835adca18e3bffbcd8efc9202d
-
SSDEEP
24576:AzYP+PYopYzFdIH4tDtoVHcGGTu/9iatGHQT/m8eKuWAjijOqOA:AxQoYgHEDcHHuu/4ai0//eKnAv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1