General
-
Target
91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2N.exe
-
Size
852KB
-
Sample
241114-crmytasmdv
-
MD5
59363d2c9a54475453b376d97c9ee620
-
SHA1
187b34e7b2e8e12b439bfc48bdb167002e9fe053
-
SHA256
91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2
-
SHA512
a9fd7b647505cd1d5b1071ec8a0e19faea16d84918281d28afd6248aae3b030740ba1a91c093eeb49eb84bb6349bd4e00b11f26338b0de96eeb1736c40963e70
-
SSDEEP
12288:TMroy90EFkZeGeGA30bkXAJ2b8AbGNtTRswj+vlSAjfQy3vDgwSW4U8oc28LSQiy:TyHWJKkkXLQQQtswj+vl73vD3ioX8Cy
Static task
static1
Behavioral task
behavioral1
Sample
91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2N.exe
-
Size
852KB
-
MD5
59363d2c9a54475453b376d97c9ee620
-
SHA1
187b34e7b2e8e12b439bfc48bdb167002e9fe053
-
SHA256
91d444a6c9e24eef17112b0a78da958b74e52f7e6094dcbee5ceba74218f60e2
-
SHA512
a9fd7b647505cd1d5b1071ec8a0e19faea16d84918281d28afd6248aae3b030740ba1a91c093eeb49eb84bb6349bd4e00b11f26338b0de96eeb1736c40963e70
-
SSDEEP
12288:TMroy90EFkZeGeGA30bkXAJ2b8AbGNtTRswj+vlSAjfQy3vDgwSW4U8oc28LSQiy:TyHWJKkkXLQQQtswj+vl73vD3ioX8Cy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1