General
-
Target
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4
-
Size
1.1MB
-
Sample
241111-c7mb8a1cjn
-
MD5
ea1e6ea4b5bd550da5b98a866056fdfb
-
SHA1
e6aea4c59a6ade593530082ad46b83faa58311b3
-
SHA256
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4
-
SHA512
84ec84b3af5fc7faf35e3eab56a5db273bfc69508d75c1e5c68b8a04e12763f251c0a6de1377c31a8816f072c8a887c944a4190c109e5dedbcdda4586035b9d3
-
SSDEEP
24576:byCZoOfJqFg6S1ucyb91zFM4M2zMkbWg6cZQNk:OCSOfzPkbBvM2zXn6EQN
Static task
static1
Behavioral task
behavioral1
Sample
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4
-
Size
1.1MB
-
MD5
ea1e6ea4b5bd550da5b98a866056fdfb
-
SHA1
e6aea4c59a6ade593530082ad46b83faa58311b3
-
SHA256
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4
-
SHA512
84ec84b3af5fc7faf35e3eab56a5db273bfc69508d75c1e5c68b8a04e12763f251c0a6de1377c31a8816f072c8a887c944a4190c109e5dedbcdda4586035b9d3
-
SSDEEP
24576:byCZoOfJqFg6S1ucyb91zFM4M2zMkbWg6cZQNk:OCSOfzPkbBvM2zXn6EQN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1