General
-
Target
5da594128451c63f08e2621f911c90186d7ce8bcf7d8c3ce8742ea2285da38c0.exe
-
Size
387KB
-
Sample
241114-jhyghswbnb
-
MD5
37f6d45c378b5d69026c82c233aba10b
-
SHA1
dbeebb9465823002408d30fe144b0b910290f154
-
SHA256
5da594128451c63f08e2621f911c90186d7ce8bcf7d8c3ce8742ea2285da38c0
-
SHA512
5e4d1ad7e68e156e2e1b48ed53950fc94079b676c9bd87e8582956c005a7a17b07fd1f3514eb5ad1ff76202aa9728d3ea0dcaa17b743e3d7a9b70a88d727ef43
-
SSDEEP
6144:Key+bnr+kp0yN90QEx84uIYXeSaVR3xSUzrXMIp6C2FS4cSh:OMrAy90b8jBuSa/dzrvniS4cSh
Static task
static1
Behavioral task
behavioral1
Sample
5da594128451c63f08e2621f911c90186d7ce8bcf7d8c3ce8742ea2285da38c0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
5da594128451c63f08e2621f911c90186d7ce8bcf7d8c3ce8742ea2285da38c0.exe
-
Size
387KB
-
MD5
37f6d45c378b5d69026c82c233aba10b
-
SHA1
dbeebb9465823002408d30fe144b0b910290f154
-
SHA256
5da594128451c63f08e2621f911c90186d7ce8bcf7d8c3ce8742ea2285da38c0
-
SHA512
5e4d1ad7e68e156e2e1b48ed53950fc94079b676c9bd87e8582956c005a7a17b07fd1f3514eb5ad1ff76202aa9728d3ea0dcaa17b743e3d7a9b70a88d727ef43
-
SSDEEP
6144:Key+bnr+kp0yN90QEx84uIYXeSaVR3xSUzrXMIp6C2FS4cSh:OMrAy90b8jBuSa/dzrvniS4cSh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1