General
-
Target
e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272
-
Size
480KB
-
Sample
241111-bd9d8aykcy
-
MD5
8c7aa3c8b63b0a68c9717c388ed7a165
-
SHA1
81ff10cfb60d2ea2625f08924103fbd226baf325
-
SHA256
e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272
-
SHA512
99f7a2f15799fd495ee44bb94bae33a72459ea73bdb91c9835247c717b60f19e4be3a9cdc0115a4f5af5e2f6ac64fa4e9b86f9ccfc5746e691e2226cea14df28
-
SSDEEP
12288:wMrVy90iqwoXPOQlWXXga3NUlbaCgv3Q8q:1y7o/Jba3NU9/gv7q
Static task
static1
Behavioral task
behavioral1
Sample
e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
douma
217.196.96.101:4132
-
auth_value
e7c0659b5f9d26f2f97df8d25fefbb44
Targets
-
-
Target
e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272
-
Size
480KB
-
MD5
8c7aa3c8b63b0a68c9717c388ed7a165
-
SHA1
81ff10cfb60d2ea2625f08924103fbd226baf325
-
SHA256
e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272
-
SHA512
99f7a2f15799fd495ee44bb94bae33a72459ea73bdb91c9835247c717b60f19e4be3a9cdc0115a4f5af5e2f6ac64fa4e9b86f9ccfc5746e691e2226cea14df28
-
SSDEEP
12288:wMrVy90iqwoXPOQlWXXga3NUlbaCgv3Q8q:1y7o/Jba3NU9/gv7q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1