General
-
Target
b04351161962763fb93edceab2277f0701adf110d74c4488bf94c22a679d6aff.exe
-
Size
560KB
-
Sample
241113-wjcyeswhrp
-
MD5
c7b5d1acfbf24aac9db0ca1ebda7fe1f
-
SHA1
a6ead193f1ae4c5131f5ac07264c0fc424f6d5f1
-
SHA256
b04351161962763fb93edceab2277f0701adf110d74c4488bf94c22a679d6aff
-
SHA512
e68c4be19bb4510de9a535da36da172abf70a7a55e70deacb234778bd96ec34ff5c6c833862cbc018f80f2478a64fad7c02243f70c9ccb5a14d9dc9b56393997
-
SSDEEP
12288:aMrDy90GXoO4LG7BqD9UhQLUfhAEYDRmSGu1BWQUM:9yhXo5HOhQLUfabmeBQM
Static task
static1
Behavioral task
behavioral1
Sample
b04351161962763fb93edceab2277f0701adf110d74c4488bf94c22a679d6aff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
b04351161962763fb93edceab2277f0701adf110d74c4488bf94c22a679d6aff.exe
-
Size
560KB
-
MD5
c7b5d1acfbf24aac9db0ca1ebda7fe1f
-
SHA1
a6ead193f1ae4c5131f5ac07264c0fc424f6d5f1
-
SHA256
b04351161962763fb93edceab2277f0701adf110d74c4488bf94c22a679d6aff
-
SHA512
e68c4be19bb4510de9a535da36da172abf70a7a55e70deacb234778bd96ec34ff5c6c833862cbc018f80f2478a64fad7c02243f70c9ccb5a14d9dc9b56393997
-
SSDEEP
12288:aMrDy90GXoO4LG7BqD9UhQLUfhAEYDRmSGu1BWQUM:9yhXo5HOhQLUfabmeBQM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1