General
-
Target
45599a942dc31f3249e62a37dfb4f860152c6967399b2aba98fda8875a870d8aN.exe
-
Size
836KB
-
Sample
241113-h4kl4szrdr
-
MD5
c7fa039476c2e4d5ac40f2767e1f5e50
-
SHA1
9c4e3295e550d5fe39c787b651def1ba1f7e87ed
-
SHA256
45599a942dc31f3249e62a37dfb4f860152c6967399b2aba98fda8875a870d8a
-
SHA512
0278564ff1aeaca47d8e6ded69c9d7388eae302d91c98f0cd48ff6f4ea697bf715e266ba9eb2a2f9f4dbc06b494abb4261ea0a33128eab0abc93d5c2f239e188
-
SSDEEP
12288:+Mrly90kUxZ0VjVshqk3IGBcQsKJbGVHkkz2QFtM2lrwN+13hE2G/iTSzVGNZnD3:byKhqZC8UGdkA2QFtMy53S9iTgV8D3
Static task
static1
Behavioral task
behavioral1
Sample
45599a942dc31f3249e62a37dfb4f860152c6967399b2aba98fda8875a870d8aN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
45599a942dc31f3249e62a37dfb4f860152c6967399b2aba98fda8875a870d8aN.exe
-
Size
836KB
-
MD5
c7fa039476c2e4d5ac40f2767e1f5e50
-
SHA1
9c4e3295e550d5fe39c787b651def1ba1f7e87ed
-
SHA256
45599a942dc31f3249e62a37dfb4f860152c6967399b2aba98fda8875a870d8a
-
SHA512
0278564ff1aeaca47d8e6ded69c9d7388eae302d91c98f0cd48ff6f4ea697bf715e266ba9eb2a2f9f4dbc06b494abb4261ea0a33128eab0abc93d5c2f239e188
-
SSDEEP
12288:+Mrly90kUxZ0VjVshqk3IGBcQsKJbGVHkkz2QFtM2lrwN+13hE2G/iTSzVGNZnD3:byKhqZC8UGdkA2QFtMy53S9iTgV8D3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1