General
-
Target
0b69e469ac19bcc4f6d8bb068d48f89bd5b98f2a0d707df71ee79dfadb4378b1N.exe
-
Size
694KB
-
Sample
241113-yqglasydqp
-
MD5
7e7059faa641e4ff7641ebdf62bbf360
-
SHA1
785fe5c913209a13268c4d28ce57c0d30f4b6f20
-
SHA256
0b69e469ac19bcc4f6d8bb068d48f89bd5b98f2a0d707df71ee79dfadb4378b1
-
SHA512
74fcbd097ebc9d753c88adadb67fbab498f675d6b44b1b296d428cee17349e2b2b7b7c2c3f856bb1cf42db8e535016415ff682c23ca7cf0a3e7def3d7c9beb1d
-
SSDEEP
12288:QMr3y90H5iXp/OAkT3G+gGLYU3K8q/oRk+8jtffT+aVC++ixhmgFGrYi:3y2Z3TkU6ptjtffyhnixr0B
Static task
static1
Behavioral task
behavioral1
Sample
0b69e469ac19bcc4f6d8bb068d48f89bd5b98f2a0d707df71ee79dfadb4378b1N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
0b69e469ac19bcc4f6d8bb068d48f89bd5b98f2a0d707df71ee79dfadb4378b1N.exe
-
Size
694KB
-
MD5
7e7059faa641e4ff7641ebdf62bbf360
-
SHA1
785fe5c913209a13268c4d28ce57c0d30f4b6f20
-
SHA256
0b69e469ac19bcc4f6d8bb068d48f89bd5b98f2a0d707df71ee79dfadb4378b1
-
SHA512
74fcbd097ebc9d753c88adadb67fbab498f675d6b44b1b296d428cee17349e2b2b7b7c2c3f856bb1cf42db8e535016415ff682c23ca7cf0a3e7def3d7c9beb1d
-
SSDEEP
12288:QMr3y90H5iXp/OAkT3G+gGLYU3K8q/oRk+8jtffT+aVC++ixhmgFGrYi:3y2Z3TkU6ptjtffyhnixr0B
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1