General
-
Target
2e82ef28672e670b9d9ca0dbffc037afbb9771ed2ff07f92fd62b77e4209795d
-
Size
520KB
-
Sample
241111-clqshs1alh
-
MD5
39c08319793b82f5ca453c98af9053e3
-
SHA1
7799859287f028020adc4ed44a087cd5e1be2653
-
SHA256
2e82ef28672e670b9d9ca0dbffc037afbb9771ed2ff07f92fd62b77e4209795d
-
SHA512
4725b20d7d317c605f1e6cc734e093594da1e836525ca1501e0c69752a1ccc4913c45aa49074723ab5cbabc0d17988f471c6ed2a9050764351811885168f570b
-
SSDEEP
12288:iMrjy90r//2tIQxQ7Nl5umjwxaZttiVdOUUhl0a6rZOaH6rV1p:pyE2tIQupuKZttiVd2iF6rV1p
Static task
static1
Behavioral task
behavioral1
Sample
2e82ef28672e670b9d9ca0dbffc037afbb9771ed2ff07f92fd62b77e4209795d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
2e82ef28672e670b9d9ca0dbffc037afbb9771ed2ff07f92fd62b77e4209795d
-
Size
520KB
-
MD5
39c08319793b82f5ca453c98af9053e3
-
SHA1
7799859287f028020adc4ed44a087cd5e1be2653
-
SHA256
2e82ef28672e670b9d9ca0dbffc037afbb9771ed2ff07f92fd62b77e4209795d
-
SHA512
4725b20d7d317c605f1e6cc734e093594da1e836525ca1501e0c69752a1ccc4913c45aa49074723ab5cbabc0d17988f471c6ed2a9050764351811885168f570b
-
SSDEEP
12288:iMrjy90r//2tIQxQ7Nl5umjwxaZttiVdOUUhl0a6rZOaH6rV1p:pyE2tIQupuKZttiVd2iF6rV1p
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1