General
-
Target
007fed0e957c3492b55d31b731cb93e1f69f586548faba977f27f130b903020d.exe
-
Size
1.0MB
-
Sample
241112-yyqtyazhnl
-
MD5
d08ddbde0a9b77474d6d2647387d11d5
-
SHA1
791452c952fffcb24358706f9fc98c690524ef69
-
SHA256
007fed0e957c3492b55d31b731cb93e1f69f586548faba977f27f130b903020d
-
SHA512
fb0c65447d817435815cdc7e2de004791df12784c3e9a01a1dc702d954e4d89d7bd0600118951e7ba2edcd46acc9b6ce613acd424dbb6f8c5c02cb42133836ce
-
SSDEEP
24576:qy4nXXVtJAG+i1Q4L3QZglhze+dY+u4mBI3+:xkHZAE+MAZgS+e3GO
Static task
static1
Behavioral task
behavioral1
Sample
007fed0e957c3492b55d31b731cb93e1f69f586548faba977f27f130b903020d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
max
185.161.248.73:4164
-
auth_value
efb1499709a5d08ed1ddf71cff71211f
Targets
-
-
Target
007fed0e957c3492b55d31b731cb93e1f69f586548faba977f27f130b903020d.exe
-
Size
1.0MB
-
MD5
d08ddbde0a9b77474d6d2647387d11d5
-
SHA1
791452c952fffcb24358706f9fc98c690524ef69
-
SHA256
007fed0e957c3492b55d31b731cb93e1f69f586548faba977f27f130b903020d
-
SHA512
fb0c65447d817435815cdc7e2de004791df12784c3e9a01a1dc702d954e4d89d7bd0600118951e7ba2edcd46acc9b6ce613acd424dbb6f8c5c02cb42133836ce
-
SSDEEP
24576:qy4nXXVtJAG+i1Q4L3QZglhze+dY+u4mBI3+:xkHZAE+MAZgS+e3GO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1