General
-
Target
6302fb0365081210d906d85d97ad4407582734c7721d6f104a9ffd8a4f55cd99.exe
-
Size
866KB
-
Sample
241119-wts3dstrhr
-
MD5
f22ea981f9a4c51d1b71838f4950673b
-
SHA1
77eb21fc620f49403716af82b28de396f7cc88e6
-
SHA256
6302fb0365081210d906d85d97ad4407582734c7721d6f104a9ffd8a4f55cd99
-
SHA512
d7fc23eca2d905c1d5046f4e603645ff184ca6dcf183bb7e7dcfb6e2e8461ed82702b1ead855004e1578fac8e5e97a998b8377d771bd15d508a1152026e0a9e1
-
SSDEEP
12288:8MrNy90DdxzWV+Q4fGC23pnHyqyNEzdWh2EV6qTK9/gq62ZiF+x13OS0UzHyc:RyUx6Vt46nHyqcEzgDVT+NQ5Fsuhc
Static task
static1
Behavioral task
behavioral1
Sample
6302fb0365081210d906d85d97ad4407582734c7721d6f104a9ffd8a4f55cd99.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
6302fb0365081210d906d85d97ad4407582734c7721d6f104a9ffd8a4f55cd99.exe
-
Size
866KB
-
MD5
f22ea981f9a4c51d1b71838f4950673b
-
SHA1
77eb21fc620f49403716af82b28de396f7cc88e6
-
SHA256
6302fb0365081210d906d85d97ad4407582734c7721d6f104a9ffd8a4f55cd99
-
SHA512
d7fc23eca2d905c1d5046f4e603645ff184ca6dcf183bb7e7dcfb6e2e8461ed82702b1ead855004e1578fac8e5e97a998b8377d771bd15d508a1152026e0a9e1
-
SSDEEP
12288:8MrNy90DdxzWV+Q4fGC23pnHyqyNEzdWh2EV6qTK9/gq62ZiF+x13OS0UzHyc:RyUx6Vt46nHyqcEzgDVT+NQ5Fsuhc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1