General
-
Target
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696
-
Size
655KB
-
Sample
241111-c1mdmstpen
-
MD5
243c96320a02acea7631c8ac4d19519b
-
SHA1
439e7bf173f6791ea2cf2d1f45afdbae8f562072
-
SHA256
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696
-
SHA512
eb38da78c22186e3ae3048982a0358c25887d9871b3f9f0e18445aa32cf5976223d4c405a3761b7dcc5be3c51b5d2fd3758e6c8a8c3b0b495b74761aaab4173f
-
SSDEEP
12288:oMrZy90Uu02r3shzl68zBtz/WBcULSTSNI6t1BQ+eaL2p1dH9Y:ByTm3Cl6G/Wq418taLy1dHq
Static task
static1
Behavioral task
behavioral1
Sample
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Targets
-
-
Target
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696
-
Size
655KB
-
MD5
243c96320a02acea7631c8ac4d19519b
-
SHA1
439e7bf173f6791ea2cf2d1f45afdbae8f562072
-
SHA256
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696
-
SHA512
eb38da78c22186e3ae3048982a0358c25887d9871b3f9f0e18445aa32cf5976223d4c405a3761b7dcc5be3c51b5d2fd3758e6c8a8c3b0b495b74761aaab4173f
-
SSDEEP
12288:oMrZy90Uu02r3shzl68zBtz/WBcULSTSNI6t1BQ+eaL2p1dH9Y:ByTm3Cl6G/Wq418taLy1dHq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1