General
-
Target
a32b0d149c969cf5c2851ba4950a0784eba7cccd0300339a0462b94db2551219
-
Size
1.2MB
-
Sample
241111-hnkxyavelp
-
MD5
d276ff784f35306c615c20b4e8fe43cd
-
SHA1
9a560c865db3ee6bb62ede76e6fe34d3c5fab7fb
-
SHA256
a32b0d149c969cf5c2851ba4950a0784eba7cccd0300339a0462b94db2551219
-
SHA512
bfe718aba795220f597732f500940da6b8b768152f7b73ecaf7fae1e3848ba6a3d7c889b3808f349db7c26ffd8f32dfe9e4f02db8e92a7e50461dba020499e8f
-
SSDEEP
24576:yyo4LJMa/2VXTtFgC2X7N0MdlYT+tN1WyTTOOlAK:Zo4tFmXTtFvsrdmT+tNnOk
Static task
static1
Behavioral task
behavioral1
Sample
a32b0d149c969cf5c2851ba4950a0784eba7cccd0300339a0462b94db2551219.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
a32b0d149c969cf5c2851ba4950a0784eba7cccd0300339a0462b94db2551219
-
Size
1.2MB
-
MD5
d276ff784f35306c615c20b4e8fe43cd
-
SHA1
9a560c865db3ee6bb62ede76e6fe34d3c5fab7fb
-
SHA256
a32b0d149c969cf5c2851ba4950a0784eba7cccd0300339a0462b94db2551219
-
SHA512
bfe718aba795220f597732f500940da6b8b768152f7b73ecaf7fae1e3848ba6a3d7c889b3808f349db7c26ffd8f32dfe9e4f02db8e92a7e50461dba020499e8f
-
SSDEEP
24576:yyo4LJMa/2VXTtFgC2X7N0MdlYT+tN1WyTTOOlAK:Zo4tFmXTtFvsrdmT+tNnOk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1