General
-
Target
6ac9d9c0272650e78026d66aa1caa6d40578271cbe7d6a7419717007e4949d36
-
Size
1.5MB
-
Sample
241111-bx8xssynct
-
MD5
aa68e82e6147f679254c8b4815b498a8
-
SHA1
4d9ac753cc3d1d5d079adae5fa2504b51efaed39
-
SHA256
6ac9d9c0272650e78026d66aa1caa6d40578271cbe7d6a7419717007e4949d36
-
SHA512
de2105e6815c6dcea7db9781958563d053575cec49402d10c8bfcd0d86effd1dff5a62ecd2eec0c66acaeb10d754fd7ac43b539bd8e4f6408ff88c15be84fe09
-
SSDEEP
49152:G5nCMyzKBZ1EyWUXE08W0pnDEWgGRbb0:dceqYK
Static task
static1
Behavioral task
behavioral1
Sample
6ac9d9c0272650e78026d66aa1caa6d40578271cbe7d6a7419717007e4949d36.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
max
185.161.248.73:4164
-
auth_value
efb1499709a5d08ed1ddf71cff71211f
Targets
-
-
Target
6ac9d9c0272650e78026d66aa1caa6d40578271cbe7d6a7419717007e4949d36
-
Size
1.5MB
-
MD5
aa68e82e6147f679254c8b4815b498a8
-
SHA1
4d9ac753cc3d1d5d079adae5fa2504b51efaed39
-
SHA256
6ac9d9c0272650e78026d66aa1caa6d40578271cbe7d6a7419717007e4949d36
-
SHA512
de2105e6815c6dcea7db9781958563d053575cec49402d10c8bfcd0d86effd1dff5a62ecd2eec0c66acaeb10d754fd7ac43b539bd8e4f6408ff88c15be84fe09
-
SSDEEP
49152:G5nCMyzKBZ1EyWUXE08W0pnDEWgGRbb0:dceqYK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1