General
-
Target
95a60ca147f9ed3a27f8a519e571fd604d4b97f34dc9b9a89191e305cceb7a16
-
Size
1.1MB
-
Sample
241111-bns5zsylgx
-
MD5
64334249a8ec45d079e212e9ddeaa267
-
SHA1
110de98cde3d2a868cfe77a896c6ec57923d97dd
-
SHA256
95a60ca147f9ed3a27f8a519e571fd604d4b97f34dc9b9a89191e305cceb7a16
-
SHA512
4a2caf3d2943480aa0354356cab5e0c67603e09e648915506f36e068eb15570c1308248480935150129af1a1539ab6223245e78bfde8354ed149526a238d13a3
-
SSDEEP
24576:2P4vhsVnJGesMsPDmwx26BQU8VxiozNbPpKx0S3qA/y:bhInUesMsbmwIsyxis9PpqBvq
Static task
static1
Behavioral task
behavioral1
Sample
34e4b463fbcd4d449f46db06b94c78d9310f627a979209f01069d3f2aacb0ef3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34e4b463fbcd4d449f46db06b94c78d9310f627a979209f01069d3f2aacb0ef3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
34e4b463fbcd4d449f46db06b94c78d9310f627a979209f01069d3f2aacb0ef3.exe
-
Size
1.2MB
-
MD5
c928c4f33501eabb6ddac2b0523f171d
-
SHA1
829a35bdb377b60971e59702a5ac50fed1ee9414
-
SHA256
34e4b463fbcd4d449f46db06b94c78d9310f627a979209f01069d3f2aacb0ef3
-
SHA512
66bea42fcc47ebb39446859272d9df748d583dd349f97b635cfda210080d8916a3985fce9c9d2c8280fd250a079a821679c9b087bb70fe10cb94b31fb487ecb1
-
SSDEEP
24576:bogX4PvpDseL3ckNcZQrKxl3fXZ16b4PEPtYn1h7Xn6iZGyF:bdoPLrcepKfBG4PEED7XF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1