General
-
Target
07811f710877a862b2de8f9c467a75e4496ae38371fc4ab147126c5526bbd9ad
-
Size
481KB
-
Sample
241111-cq8twstmdj
-
MD5
d219767b2bd5cea1778939e3ce6dec29
-
SHA1
674f03e99a8ce2e108a53a32a5bc1a34c67902de
-
SHA256
07811f710877a862b2de8f9c467a75e4496ae38371fc4ab147126c5526bbd9ad
-
SHA512
72260801a64b25b64e347ce8bda5ac66a955b1606ff22afa5cc488d232721c7e4c8b42ddec9a265d8c66da34a8fc6ca535f8aaec6f685a3b7bd341f8f4d60ef4
-
SSDEEP
12288:BMrOy907zZpdI7Bs6qzRa4fZqP54sOvYmSDjkh:fyepWts6uRa4QP5kYmSDjo
Static task
static1
Behavioral task
behavioral1
Sample
07811f710877a862b2de8f9c467a75e4496ae38371fc4ab147126c5526bbd9ad.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
douma
217.196.96.101:4132
-
auth_value
e7c0659b5f9d26f2f97df8d25fefbb44
Targets
-
-
Target
07811f710877a862b2de8f9c467a75e4496ae38371fc4ab147126c5526bbd9ad
-
Size
481KB
-
MD5
d219767b2bd5cea1778939e3ce6dec29
-
SHA1
674f03e99a8ce2e108a53a32a5bc1a34c67902de
-
SHA256
07811f710877a862b2de8f9c467a75e4496ae38371fc4ab147126c5526bbd9ad
-
SHA512
72260801a64b25b64e347ce8bda5ac66a955b1606ff22afa5cc488d232721c7e4c8b42ddec9a265d8c66da34a8fc6ca535f8aaec6f685a3b7bd341f8f4d60ef4
-
SSDEEP
12288:BMrOy907zZpdI7Bs6qzRa4fZqP54sOvYmSDjkh:fyepWts6uRa4QP5kYmSDjo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1