General
-
Target
ce5035a022e1370dc1d0314444095bb9476e118f37c3292b9a9dc6b7862a358bN.exe
-
Size
416KB
-
Sample
241116-b9zvnaxepd
-
MD5
35b69f4250d6c363873723c2c85b0fa0
-
SHA1
566796c71d0df92d366d485ccf9c9455c20a7d79
-
SHA256
ce5035a022e1370dc1d0314444095bb9476e118f37c3292b9a9dc6b7862a358b
-
SHA512
b454ed6e3c11e90bb8d4dfae8828df5234e333b7dc45dd456c9800bd0040929958b693d938a8bd74656fcc2f2e4dc21cffebb6e12ad1f7c471f3198dc694d753
-
SSDEEP
6144:K9y+bnr+hp0yN90QEpTO196eEC7VPKJ87XC1CG1wR2Xb8ufaR3c9YmR+saNzyZW1:3MrZy90PKYeEC7k8sCG2Rm8wGACR0W1
Static task
static1
Behavioral task
behavioral1
Sample
ce5035a022e1370dc1d0314444095bb9476e118f37c3292b9a9dc6b7862a358bN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Targets
-
-
Target
ce5035a022e1370dc1d0314444095bb9476e118f37c3292b9a9dc6b7862a358bN.exe
-
Size
416KB
-
MD5
35b69f4250d6c363873723c2c85b0fa0
-
SHA1
566796c71d0df92d366d485ccf9c9455c20a7d79
-
SHA256
ce5035a022e1370dc1d0314444095bb9476e118f37c3292b9a9dc6b7862a358b
-
SHA512
b454ed6e3c11e90bb8d4dfae8828df5234e333b7dc45dd456c9800bd0040929958b693d938a8bd74656fcc2f2e4dc21cffebb6e12ad1f7c471f3198dc694d753
-
SSDEEP
6144:K9y+bnr+hp0yN90QEpTO196eEC7VPKJ87XC1CG1wR2Xb8ufaR3c9YmR+saNzyZW1:3MrZy90PKYeEC7k8sCG2Rm8wGACR0W1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1