General
-
Target
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
Size
666KB
-
Sample
241111-cpq8fszfqq
-
MD5
0c9778e3bd70c313dd3277be818477ae
-
SHA1
6c25fe888c18f27f67453603dc650dc93f00e499
-
SHA256
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
SHA512
09781bd5bf7aac6de5e678a2941f989fb38f4a32f2d5c4e5db81adb20c9f38840740dd9f13390ef654b4f73ec547ec70c3cd4006d7903e31ef08b0c5077768c1
-
SSDEEP
12288:3MrEy90Cq0QSSfm5BdFFwhCXdGI5k4H4oPrmR3X6NzP/B374PISYd+8:ry6Bm5Bn+hodGI53PK3wbB374H8
Static task
static1
Behavioral task
behavioral1
Sample
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
Size
666KB
-
MD5
0c9778e3bd70c313dd3277be818477ae
-
SHA1
6c25fe888c18f27f67453603dc650dc93f00e499
-
SHA256
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
SHA512
09781bd5bf7aac6de5e678a2941f989fb38f4a32f2d5c4e5db81adb20c9f38840740dd9f13390ef654b4f73ec547ec70c3cd4006d7903e31ef08b0c5077768c1
-
SSDEEP
12288:3MrEy90Cq0QSSfm5BdFFwhCXdGI5k4H4oPrmR3X6NzP/B374PISYd+8:ry6Bm5Bn+hodGI53PK3wbB374H8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1