General
-
Target
1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1
-
Size
551KB
-
Sample
241113-y4zc9sydnf
-
MD5
555199ad434506ce0f8f21ebe69c8868
-
SHA1
cc723560c3f9b6624ba44429d5c3817485f62a60
-
SHA256
1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1
-
SHA512
f7a42ec464301b516dc4b26044e0ddfa3045610057739c80b4a2f208f9086a5d9aa7e9811eca7b9d4fbf62011d7f4b44f2f03b0af061cdd72c6d5c80d1185d60
-
SSDEEP
12288:8Mrby90QWvWeLZBfLx73QS9qCAaiRdD1Ed/Vmpn4J8p56b+tH:XyLyBzW8A5iSn4JWU+Z
Static task
static1
Behavioral task
behavioral1
Sample
1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1
-
Size
551KB
-
MD5
555199ad434506ce0f8f21ebe69c8868
-
SHA1
cc723560c3f9b6624ba44429d5c3817485f62a60
-
SHA256
1f8f2e95d6f85e33cc296e2b7176851bca9c1aa3b54ce642db91edb9844c7eb1
-
SHA512
f7a42ec464301b516dc4b26044e0ddfa3045610057739c80b4a2f208f9086a5d9aa7e9811eca7b9d4fbf62011d7f4b44f2f03b0af061cdd72c6d5c80d1185d60
-
SSDEEP
12288:8Mrby90QWvWeLZBfLx73QS9qCAaiRdD1Ed/Vmpn4J8p56b+tH:XyLyBzW8A5iSn4JWU+Z
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1