General
-
Target
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9
-
Size
689KB
-
Sample
241111-bd13vayfmr
-
MD5
4789250d5f6bfe7b7b8a1c49b986f4df
-
SHA1
b3d24319a7cfe95eb8b3bf0c291190dc423010d0
-
SHA256
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9
-
SHA512
ec8b476a010c3481bee4d3ab60eb2c2c715ab3fbdadc262893d7e592ccc03b32d097c84d694b4c2f5e7e1278d383e6d6795afc4922ab118ab401b3f7ec7d4d2a
-
SSDEEP
12288:IMrBy90UWbc9ihXYYMpU9qIUVVm+pSrmAz85JscOTl843xAYMIKbYtmNgydCwxR0:5yfWVhXYYMpU98mXrzIW64hPMR0tmXCH
Static task
static1
Behavioral task
behavioral1
Sample
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9
-
Size
689KB
-
MD5
4789250d5f6bfe7b7b8a1c49b986f4df
-
SHA1
b3d24319a7cfe95eb8b3bf0c291190dc423010d0
-
SHA256
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9
-
SHA512
ec8b476a010c3481bee4d3ab60eb2c2c715ab3fbdadc262893d7e592ccc03b32d097c84d694b4c2f5e7e1278d383e6d6795afc4922ab118ab401b3f7ec7d4d2a
-
SSDEEP
12288:IMrBy90UWbc9ihXYYMpU9qIUVVm+pSrmAz85JscOTl843xAYMIKbYtmNgydCwxR0:5yfWVhXYYMpU98mXrzIW64hPMR0tmXCH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1