General
-
Target
5748cb286039d282ab32c966341ffa9926c132b4900687076e16c01d90fcef3fN.exe
-
Size
547KB
-
Sample
241118-wnvzssxjhj
-
MD5
b41064a74302948e5d4228ec68eb53d0
-
SHA1
179ebb6819d3a8f5c36f624ee89377c370c4fe66
-
SHA256
5748cb286039d282ab32c966341ffa9926c132b4900687076e16c01d90fcef3f
-
SHA512
c241b8df21e8d987aa7ab62bebf8078384e5061e4d96b3d332a9cfb73099012f9f58a9e57bbe37e0ed662e7d5d0ba4265113925a9ee32af944b935ad1ec01d70
-
SSDEEP
12288:DMr+y90STzqB172lg/INI3VVmRLiRv0543xCYMTKbPp:1yzuBVnJmsk4hBM+l
Static task
static1
Behavioral task
behavioral1
Sample
5748cb286039d282ab32c966341ffa9926c132b4900687076e16c01d90fcef3fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
5748cb286039d282ab32c966341ffa9926c132b4900687076e16c01d90fcef3fN.exe
-
Size
547KB
-
MD5
b41064a74302948e5d4228ec68eb53d0
-
SHA1
179ebb6819d3a8f5c36f624ee89377c370c4fe66
-
SHA256
5748cb286039d282ab32c966341ffa9926c132b4900687076e16c01d90fcef3f
-
SHA512
c241b8df21e8d987aa7ab62bebf8078384e5061e4d96b3d332a9cfb73099012f9f58a9e57bbe37e0ed662e7d5d0ba4265113925a9ee32af944b935ad1ec01d70
-
SSDEEP
12288:DMr+y90STzqB172lg/INI3VVmRLiRv0543xCYMTKbPp:1yzuBVnJmsk4hBM+l
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1