General
-
Target
9dbdd05917258bb11dd8bd69acf7ca3109d6b9f435f35999be99df6b39cb6ed7N.exe
-
Size
676KB
-
Sample
241113-hzpp9sxdlf
-
MD5
df12020f2fd3d2bf5a272998bea2a550
-
SHA1
749192afe9537a0067eadc6eddfd9162c97e6716
-
SHA256
9dbdd05917258bb11dd8bd69acf7ca3109d6b9f435f35999be99df6b39cb6ed7
-
SHA512
127bbf3a4b15c13d50865c8dbbbaf377f1952300bf3061de8767cefe8e299ac55c07af0705c9d213f1ee08cceb82c907246151f587dcf73d50e6b79491676c4d
-
SSDEEP
12288:yMr+y90gl7+lmMXdP2PzB7xrkWoTEDIY/pQrDiqFvboA/8Ui4EHV6zgaNr02:Iyll7+/NP21NkWEAurDDJ/8UyHkzBrf
Static task
static1
Behavioral task
behavioral1
Sample
9dbdd05917258bb11dd8bd69acf7ca3109d6b9f435f35999be99df6b39cb6ed7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
9dbdd05917258bb11dd8bd69acf7ca3109d6b9f435f35999be99df6b39cb6ed7N.exe
-
Size
676KB
-
MD5
df12020f2fd3d2bf5a272998bea2a550
-
SHA1
749192afe9537a0067eadc6eddfd9162c97e6716
-
SHA256
9dbdd05917258bb11dd8bd69acf7ca3109d6b9f435f35999be99df6b39cb6ed7
-
SHA512
127bbf3a4b15c13d50865c8dbbbaf377f1952300bf3061de8767cefe8e299ac55c07af0705c9d213f1ee08cceb82c907246151f587dcf73d50e6b79491676c4d
-
SSDEEP
12288:yMr+y90gl7+lmMXdP2PzB7xrkWoTEDIY/pQrDiqFvboA/8Ui4EHV6zgaNr02:Iyll7+/NP21NkWEAurDDJ/8UyHkzBrf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1