General
-
Target
a843eed119d6f0e11438cc666eacf97fe86a5876c04586070850e6f3653e74fd.exe
-
Size
848KB
-
Sample
241122-s97c6szleq
-
MD5
1dd363d97200e94dff3aa5a0dc86eaf2
-
SHA1
0e6509b32fb7fb985df2da9fb88c76daa7fb5be1
-
SHA256
a843eed119d6f0e11438cc666eacf97fe86a5876c04586070850e6f3653e74fd
-
SHA512
653d65711fae1949c745cd6254053e81f8caae47c745c2109ee4347c80c503a90fb540990bff24b52be2812c4c7fe3245e7a389a16ce695f0e7d74e3c7940e63
-
SSDEEP
24576:FypHbVgZ6Gl/SqOGIiokddVXz5cFFhd4C3cApMYSe:gpHbkxlMiobFbd4Cr
Static task
static1
Behavioral task
behavioral1
Sample
a843eed119d6f0e11438cc666eacf97fe86a5876c04586070850e6f3653e74fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Targets
-
-
Target
a843eed119d6f0e11438cc666eacf97fe86a5876c04586070850e6f3653e74fd.exe
-
Size
848KB
-
MD5
1dd363d97200e94dff3aa5a0dc86eaf2
-
SHA1
0e6509b32fb7fb985df2da9fb88c76daa7fb5be1
-
SHA256
a843eed119d6f0e11438cc666eacf97fe86a5876c04586070850e6f3653e74fd
-
SHA512
653d65711fae1949c745cd6254053e81f8caae47c745c2109ee4347c80c503a90fb540990bff24b52be2812c4c7fe3245e7a389a16ce695f0e7d74e3c7940e63
-
SSDEEP
24576:FypHbVgZ6Gl/SqOGIiokddVXz5cFFhd4C3cApMYSe:gpHbkxlMiobFbd4Cr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1