General
-
Target
d81e7874e4dd4cfd6ad52446a37f5759b144d01bb78d66b4ea5866ffe1862f2c
-
Size
555KB
-
Sample
241111-bxt4mszamj
-
MD5
8f58114a5525a5ed2424066667826456
-
SHA1
b095d9b162e25f254357296660ea8555465118c4
-
SHA256
d81e7874e4dd4cfd6ad52446a37f5759b144d01bb78d66b4ea5866ffe1862f2c
-
SHA512
9885a6b32cbe237881233909b76491d4bf190695bf99a0fb9aba37295100a4fe2a517f116a6c05ac86b2e247b5c8b6c7546741c13941a7cc1b0360164e9fabd4
-
SSDEEP
12288:hMrSy90KioTLcqkxyt9E1Bg+INqkUk8497W9O3:ryn/cqXX+jNQ97W9u
Static task
static1
Behavioral task
behavioral1
Sample
d81e7874e4dd4cfd6ad52446a37f5759b144d01bb78d66b4ea5866ffe1862f2c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
d81e7874e4dd4cfd6ad52446a37f5759b144d01bb78d66b4ea5866ffe1862f2c
-
Size
555KB
-
MD5
8f58114a5525a5ed2424066667826456
-
SHA1
b095d9b162e25f254357296660ea8555465118c4
-
SHA256
d81e7874e4dd4cfd6ad52446a37f5759b144d01bb78d66b4ea5866ffe1862f2c
-
SHA512
9885a6b32cbe237881233909b76491d4bf190695bf99a0fb9aba37295100a4fe2a517f116a6c05ac86b2e247b5c8b6c7546741c13941a7cc1b0360164e9fabd4
-
SSDEEP
12288:hMrSy90KioTLcqkxyt9E1Bg+INqkUk8497W9O3:ryn/cqXX+jNQ97W9u
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1