General
-
Target
33388a2775b4367a2050d77667dbf2b4906077a7c330d320443004b8633f2d86.exe
-
Size
676KB
-
Sample
241113-gxl1xszner
-
MD5
2b37be2846d316fb4870543696d58de8
-
SHA1
5463df79a4c69793e1f18b96fe8fe9b7eebb971a
-
SHA256
33388a2775b4367a2050d77667dbf2b4906077a7c330d320443004b8633f2d86
-
SHA512
3247801bc60867d6e689b190277cb355460f4d2edadec50733d1a43d834d4e8745deb6d4ecbe8be92094f629a1aa8cd4c164020e73726039076aad4703811aea
-
SSDEEP
12288:nMr9y90I59BqMg0+eoZW5jWhOEft+hUN29/8UiJEWV6zgaY+h:Oyz+BZW9gvl+hUN29/8U7WkzE+h
Static task
static1
Behavioral task
behavioral1
Sample
33388a2775b4367a2050d77667dbf2b4906077a7c330d320443004b8633f2d86.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
33388a2775b4367a2050d77667dbf2b4906077a7c330d320443004b8633f2d86.exe
-
Size
676KB
-
MD5
2b37be2846d316fb4870543696d58de8
-
SHA1
5463df79a4c69793e1f18b96fe8fe9b7eebb971a
-
SHA256
33388a2775b4367a2050d77667dbf2b4906077a7c330d320443004b8633f2d86
-
SHA512
3247801bc60867d6e689b190277cb355460f4d2edadec50733d1a43d834d4e8745deb6d4ecbe8be92094f629a1aa8cd4c164020e73726039076aad4703811aea
-
SSDEEP
12288:nMr9y90I59BqMg0+eoZW5jWhOEft+hUN29/8UiJEWV6zgaY+h:Oyz+BZW9gvl+hUN29/8U7WkzE+h
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1