General
-
Target
28be1d170281011a75d75f03b20a985f0142d43dd46dbce359ce82011bc64fc3N.exe
-
Size
707KB
-
Sample
241120-3m6s8swald
-
MD5
155120b7f6414fd3b252a020d7eefe20
-
SHA1
9504de6e5ac33f993c4f6e0ad7541aa92a5998f6
-
SHA256
28be1d170281011a75d75f03b20a985f0142d43dd46dbce359ce82011bc64fc3
-
SHA512
5e7040286c2b5e838b5f47e31aa85ac57fac047944619d93b6edf2b39b03d44504bdcd87e25c98a9fa5496e8b2d83588986643d71118c71c2c17abe502f0ca93
-
SSDEEP
12288:RMrQy909XVOtKXiohFC3dkx0uQan4DKOGDlrAjYF03vDW0SWiUDs:ByEXVOMX/jdx0+4DjGDly3vDBXs
Static task
static1
Behavioral task
behavioral1
Sample
28be1d170281011a75d75f03b20a985f0142d43dd46dbce359ce82011bc64fc3N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
28be1d170281011a75d75f03b20a985f0142d43dd46dbce359ce82011bc64fc3N.exe
-
Size
707KB
-
MD5
155120b7f6414fd3b252a020d7eefe20
-
SHA1
9504de6e5ac33f993c4f6e0ad7541aa92a5998f6
-
SHA256
28be1d170281011a75d75f03b20a985f0142d43dd46dbce359ce82011bc64fc3
-
SHA512
5e7040286c2b5e838b5f47e31aa85ac57fac047944619d93b6edf2b39b03d44504bdcd87e25c98a9fa5496e8b2d83588986643d71118c71c2c17abe502f0ca93
-
SSDEEP
12288:RMrQy909XVOtKXiohFC3dkx0uQan4DKOGDlrAjYF03vDW0SWiUDs:ByEXVOMX/jdx0+4DjGDly3vDBXs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1