General
-
Target
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe
-
Size
594KB
-
Sample
241118-k793aasrfv
-
MD5
032d79225acbd1031400de9102874f7d
-
SHA1
64e51beccb0d4db3341303cb8e59e1ad0a480043
-
SHA256
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45
-
SHA512
072687df6c3bde38eb90732cb878b2ff4989f9512911d8636a4e3329cb26e7b2bb3a8220e934765ead45a8f86bc64863dc949c00c4bc27bd6023f94db2d6b8c0
-
SSDEEP
12288:Iy90w5Y4/A7f0FRqTzlWtQvNf236EVlbApMRg:Iyl6YFRqdqJ36EbNg
Static task
static1
Behavioral task
behavioral1
Sample
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Targets
-
-
Target
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe
-
Size
594KB
-
MD5
032d79225acbd1031400de9102874f7d
-
SHA1
64e51beccb0d4db3341303cb8e59e1ad0a480043
-
SHA256
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45
-
SHA512
072687df6c3bde38eb90732cb878b2ff4989f9512911d8636a4e3329cb26e7b2bb3a8220e934765ead45a8f86bc64863dc949c00c4bc27bd6023f94db2d6b8c0
-
SSDEEP
12288:Iy90w5Y4/A7f0FRqTzlWtQvNf236EVlbApMRg:Iyl6YFRqdqJ36EbNg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1