General
-
Target
6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92.exe
-
Size
695KB
-
Sample
241113-krq98ssjar
-
MD5
c5de52856d784d243b150d5556ae80ab
-
SHA1
343c13d8af9c726919aa9b907a3a18f017b813f9
-
SHA256
6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92
-
SHA512
8b28624c4ef7fb089fdac2b793a4f16d622f2fa2b0afc64aa73cd52417ce509d2f0f619a1bff6a761b6fb509bcd14d0f404fd23ce849b4f023aaf14c88314920
-
SSDEEP
12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxDK:pyM7UN8Qv0uWFWIug/vC6wbRtK
Static task
static1
Behavioral task
behavioral1
Sample
6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92.exe
-
Size
695KB
-
MD5
c5de52856d784d243b150d5556ae80ab
-
SHA1
343c13d8af9c726919aa9b907a3a18f017b813f9
-
SHA256
6a7e578069b28c7e9c6f8b5c0949eaa344308678395b0598837fef0847b7cf92
-
SHA512
8b28624c4ef7fb089fdac2b793a4f16d622f2fa2b0afc64aa73cd52417ce509d2f0f619a1bff6a761b6fb509bcd14d0f404fd23ce849b4f023aaf14c88314920
-
SSDEEP
12288:JMrAy90ovbqC+UXn758idC603+W6QwBBILaPI/IOa/aCeDVwbRxDK:pyM7UN8Qv0uWFWIug/vC6wbRtK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1