General
-
Target
aee3051bee81b73d288f5dd15af9720b85f94669b95d427ebd4c52c49b71018c
-
Size
689KB
-
Sample
241111-cxnsaszhpn
-
MD5
8eb4e933a00c14c8b9ce73033d85d3e9
-
SHA1
95ef774641384e6777b0c16952168649fe10d422
-
SHA256
aee3051bee81b73d288f5dd15af9720b85f94669b95d427ebd4c52c49b71018c
-
SHA512
56307fbe077923268404d6882f702489829168edc2a8396b7aa98103fd686d5bbfb7224f484ff09866fdd6a1b4379c9a379fd4b5c384d7713686582b9846efda
-
SSDEEP
12288:CMrey90s6XWwveMsvNLEr25/ZgF8+tU6tzh0iYAaTI/43xPYM/KbojWeW:Iyr+WwveMsvNorYBAbzUy4hQMykyeW
Static task
static1
Behavioral task
behavioral1
Sample
aee3051bee81b73d288f5dd15af9720b85f94669b95d427ebd4c52c49b71018c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
aee3051bee81b73d288f5dd15af9720b85f94669b95d427ebd4c52c49b71018c
-
Size
689KB
-
MD5
8eb4e933a00c14c8b9ce73033d85d3e9
-
SHA1
95ef774641384e6777b0c16952168649fe10d422
-
SHA256
aee3051bee81b73d288f5dd15af9720b85f94669b95d427ebd4c52c49b71018c
-
SHA512
56307fbe077923268404d6882f702489829168edc2a8396b7aa98103fd686d5bbfb7224f484ff09866fdd6a1b4379c9a379fd4b5c384d7713686582b9846efda
-
SSDEEP
12288:CMrey90s6XWwveMsvNLEr25/ZgF8+tU6tzh0iYAaTI/43xPYM/KbojWeW:Iyr+WwveMsvNorYBAbzUy4hQMykyeW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1