General
-
Target
d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9
-
Size
677KB
-
Sample
241111-byltnaynds
-
MD5
3a429d1c57d6d50a91dcf79f3200be26
-
SHA1
e17bbb42970e0ae4999aaaf871fa42e94d455d51
-
SHA256
d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9
-
SHA512
4e3ff37af60ad4a9c7c6a6abfff8070be262fcf288562307171a9374c9c376b34266dacab6acaa9674acb54520c2af16e367d30cd4af1147859216061eec4e29
-
SSDEEP
12288:vMrMy907jCLiMzVcAttC/+59F1LmkjGXdAQMBJrLgqRhOSH7fu2ARIAAp7xf:vyYjCLi2V/L979jNbTHZhDHbQ87xf
Static task
static1
Behavioral task
behavioral1
Sample
d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9
-
Size
677KB
-
MD5
3a429d1c57d6d50a91dcf79f3200be26
-
SHA1
e17bbb42970e0ae4999aaaf871fa42e94d455d51
-
SHA256
d420315ddc9efa13163ad22a8abcfa00e3ae8286001e9b29ee5d522bbc4891d9
-
SHA512
4e3ff37af60ad4a9c7c6a6abfff8070be262fcf288562307171a9374c9c376b34266dacab6acaa9674acb54520c2af16e367d30cd4af1147859216061eec4e29
-
SSDEEP
12288:vMrMy907jCLiMzVcAttC/+59F1LmkjGXdAQMBJrLgqRhOSH7fu2ARIAAp7xf:vyYjCLi2V/L979jNbTHZhDHbQ87xf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1