General
-
Target
11c8789645f42f9a1569e92a3a96e64dc29e9ea69e3f16d6b10dad9bf9239494.exe
-
Size
694KB
-
Sample
241114-bpph7a1qfx
-
MD5
c7cc364669255001148895ceec2bcc0f
-
SHA1
59dfcb5ce6d27b06fb0ba7d77d9203e0bff70b3e
-
SHA256
11c8789645f42f9a1569e92a3a96e64dc29e9ea69e3f16d6b10dad9bf9239494
-
SHA512
133d126ef6b1065159a06bbfe8a025516688209972b9a8347174f5b9089a6126ef7db6aadfac9079f947b8fb743313d2780cc701b410e9efabad3b8a383e0de3
-
SSDEEP
12288:QMr3y90H5iXp/OAkT3G+gGLYU3K8q/oRk+8jtffT+aVC++ixhmgFGrYif:3y2Z3TkU6ptjtffyhnixr0Bf
Static task
static1
Behavioral task
behavioral1
Sample
11c8789645f42f9a1569e92a3a96e64dc29e9ea69e3f16d6b10dad9bf9239494.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
11c8789645f42f9a1569e92a3a96e64dc29e9ea69e3f16d6b10dad9bf9239494.exe
-
Size
694KB
-
MD5
c7cc364669255001148895ceec2bcc0f
-
SHA1
59dfcb5ce6d27b06fb0ba7d77d9203e0bff70b3e
-
SHA256
11c8789645f42f9a1569e92a3a96e64dc29e9ea69e3f16d6b10dad9bf9239494
-
SHA512
133d126ef6b1065159a06bbfe8a025516688209972b9a8347174f5b9089a6126ef7db6aadfac9079f947b8fb743313d2780cc701b410e9efabad3b8a383e0de3
-
SSDEEP
12288:QMr3y90H5iXp/OAkT3G+gGLYU3K8q/oRk+8jtffT+aVC++ixhmgFGrYif:3y2Z3TkU6ptjtffyhnixr0Bf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1