General
-
Target
89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba
-
Size
555KB
-
Sample
241111-bsd7maymdy
-
MD5
6a623d53d0ed23fda949820f1dfc0b24
-
SHA1
c00aa74fee435231bb444ded346b0270d1aa2066
-
SHA256
89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba
-
SHA512
9f4745704f0a8ab504d4717115afb086d4ced6f0e86d9b9ca775c80637804b9241b6f27950bc06059bb8f376f9de756170bc4340b5ba8f550d5ebbda89654437
-
SSDEEP
12288:aMrWy90CnhzQQVV+kM74dflKF8X7EcIEDUW8yYCuNuMQ:EyrVVvflEy7QL2MQ
Static task
static1
Behavioral task
behavioral1
Sample
89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba
-
Size
555KB
-
MD5
6a623d53d0ed23fda949820f1dfc0b24
-
SHA1
c00aa74fee435231bb444ded346b0270d1aa2066
-
SHA256
89baeb3e52c275a943b8eac1594881a3cc0bedfedce5d640bc223737a14d3cba
-
SHA512
9f4745704f0a8ab504d4717115afb086d4ced6f0e86d9b9ca775c80637804b9241b6f27950bc06059bb8f376f9de756170bc4340b5ba8f550d5ebbda89654437
-
SSDEEP
12288:aMrWy90CnhzQQVV+kM74dflKF8X7EcIEDUW8yYCuNuMQ:EyrVVvflEy7QL2MQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1