General
-
Target
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19
-
Size
479KB
-
Sample
241111-cglyrstkbm
-
MD5
d8aa17a35e7fffa914ee73bffd54fb44
-
SHA1
9a23ae078acf8523ba9b60b60f6366f8d5495cbe
-
SHA256
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19
-
SHA512
a3cea61ddacd442028dd924e1659df23c5ec5b5f6fc18352033c414dcefa38ada47f9b3c6a8b9559fa2fb445a7d7bd350e1c3139d3e38bda23e8bdf3418f0419
-
SSDEEP
12288:ZMrzy90a/In/YP1qkxgWgl4FGPuHv+D1sVzK:eyXI/YNlTCTlD1qzK
Static task
static1
Behavioral task
behavioral1
Sample
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
murka
217.196.96.101:4132
-
auth_value
878a0681ac6ad0e4eb10ef9db07abdd9
Targets
-
-
Target
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19
-
Size
479KB
-
MD5
d8aa17a35e7fffa914ee73bffd54fb44
-
SHA1
9a23ae078acf8523ba9b60b60f6366f8d5495cbe
-
SHA256
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19
-
SHA512
a3cea61ddacd442028dd924e1659df23c5ec5b5f6fc18352033c414dcefa38ada47f9b3c6a8b9559fa2fb445a7d7bd350e1c3139d3e38bda23e8bdf3418f0419
-
SSDEEP
12288:ZMrzy90a/In/YP1qkxgWgl4FGPuHv+D1sVzK:eyXI/YNlTCTlD1qzK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1