General
-
Target
a620f7eb04ed1c6a4cdb0a9156d4e91bede3e404a9c97cb7825eab90311c2179
-
Size
1.1MB
-
Sample
241111-cfehaszdrl
-
MD5
6135580e167df7532b64f85ad09a9a9f
-
SHA1
c42e062a40a89d41081428af6c50119286996351
-
SHA256
a620f7eb04ed1c6a4cdb0a9156d4e91bede3e404a9c97cb7825eab90311c2179
-
SHA512
0a0932a6607f8cc2b368ad2a18d473186a33a9192de535bb4e1743462b1681960f9785634142ad0cb673b1750191e8b4e0797a77f5e169a992227d2149ed07df
-
SSDEEP
24576:CWBMLsofhfaUjLsEjc1mJGITY/49JGdHtQ9gETEDSGz9BZRN9s:hBXWfawjemJGuY/4Cy9jIWGLZRU
Static task
static1
Behavioral task
behavioral1
Sample
a460f28077b388b7191a1fabbc759d4c242c46336a3cd94d62d9d6a12a5d791f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a460f28077b388b7191a1fabbc759d4c242c46336a3cd94d62d9d6a12a5d791f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
a460f28077b388b7191a1fabbc759d4c242c46336a3cd94d62d9d6a12a5d791f.exe
-
Size
1.2MB
-
MD5
70b1b16439abd656880e9130ae400a0e
-
SHA1
87d4fec967e62e34b1d199b35e352ee11c3e5f3b
-
SHA256
a460f28077b388b7191a1fabbc759d4c242c46336a3cd94d62d9d6a12a5d791f
-
SHA512
926d73b0bbaa91f9069d8a637f09bcaaa0b1f4f83622e2965ad747e7adada184b343219c9df6d31f126f372f6d67684120976e66f0c7bf6003b59aa4c69cefe4
-
SSDEEP
24576:JogX4PvpDseL3ckNcZQrKxl3fXZ16b4PEPtYn1h7Xn6iZGyF:JdoPLrcepKfBG4PEED7XF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1