General
-
Target
b4d933232605f020c8907260da5e94e2cb17586d1e9e1f47c05862309fb86bd9
-
Size
394KB
-
Sample
241111-czvzds1akm
-
MD5
2e0b2b2435ea4281b12c0a6e411c5336
-
SHA1
123accd3fe44d4ca03446b39c4b0bf8a68dcba37
-
SHA256
b4d933232605f020c8907260da5e94e2cb17586d1e9e1f47c05862309fb86bd9
-
SHA512
af693186b55578d6efd521313445cc60b43137fb2f322e220169e9c458b1cf0e744c77591170aa08df8d5c08b49752ebe5be802fdfb2812cfd53ffa478eacdc0
-
SSDEEP
6144:Kky+bnr+yp0yN90QEVcV2a5PZGVQSQZ9QuYNfzHBUB9hKC7wc3PK+i:0Mryy907a5PaYAfzC40wyPK+i
Static task
static1
Behavioral task
behavioral1
Sample
b4d933232605f020c8907260da5e94e2cb17586d1e9e1f47c05862309fb86bd9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
b4d933232605f020c8907260da5e94e2cb17586d1e9e1f47c05862309fb86bd9
-
Size
394KB
-
MD5
2e0b2b2435ea4281b12c0a6e411c5336
-
SHA1
123accd3fe44d4ca03446b39c4b0bf8a68dcba37
-
SHA256
b4d933232605f020c8907260da5e94e2cb17586d1e9e1f47c05862309fb86bd9
-
SHA512
af693186b55578d6efd521313445cc60b43137fb2f322e220169e9c458b1cf0e744c77591170aa08df8d5c08b49752ebe5be802fdfb2812cfd53ffa478eacdc0
-
SSDEEP
6144:Kky+bnr+yp0yN90QEVcV2a5PZGVQSQZ9QuYNfzHBUB9hKC7wc3PK+i:0Mryy907a5PaYAfzC40wyPK+i
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1