General
-
Target
bdebfd9f5c67f21c317e68d6d6406cd437571609c63990134ebeeb66c02ef856N.exe
-
Size
676KB
-
Sample
241114-dkqlsstepb
-
MD5
0eacc2792d5a7661ff471c6d10b083f0
-
SHA1
a6328db5d1a6dc2ebcdb3fa98b79a22886423b68
-
SHA256
bdebfd9f5c67f21c317e68d6d6406cd437571609c63990134ebeeb66c02ef856
-
SHA512
65aae10a1e0cc9eeb59fbd7249a33f77b9425def148168eabdb15d377b97318deed3fc2ef0391fd406d9d6b58cbfa858edd68be9b715b97c3062b777c7d06be8
-
SSDEEP
12288:nMr9y90I59BqMg0+eoZW5jWhOEft+hUN29/8UiJEWV6zgaY+:Oyz+BZW9gvl+hUN29/8U7WkzE+
Static task
static1
Behavioral task
behavioral1
Sample
bdebfd9f5c67f21c317e68d6d6406cd437571609c63990134ebeeb66c02ef856N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
bdebfd9f5c67f21c317e68d6d6406cd437571609c63990134ebeeb66c02ef856N.exe
-
Size
676KB
-
MD5
0eacc2792d5a7661ff471c6d10b083f0
-
SHA1
a6328db5d1a6dc2ebcdb3fa98b79a22886423b68
-
SHA256
bdebfd9f5c67f21c317e68d6d6406cd437571609c63990134ebeeb66c02ef856
-
SHA512
65aae10a1e0cc9eeb59fbd7249a33f77b9425def148168eabdb15d377b97318deed3fc2ef0391fd406d9d6b58cbfa858edd68be9b715b97c3062b777c7d06be8
-
SSDEEP
12288:nMr9y90I59BqMg0+eoZW5jWhOEft+hUN29/8UiJEWV6zgaY+:Oyz+BZW9gvl+hUN29/8U7WkzE+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1