General
-
Target
8b5b7c1c7c8ddaa701ea7ab88a69d437bccec01f59ec3a0e106455848eedf610
-
Size
309KB
-
Sample
241203-acggdawjbj
-
MD5
35fe46eccd981a495d1c2ec4e8e056a7
-
SHA1
08549a9999578d4b343b643c0bd0416d8774c686
-
SHA256
8b5b7c1c7c8ddaa701ea7ab88a69d437bccec01f59ec3a0e106455848eedf610
-
SHA512
509f1ff9c165b4b61f7d61517b10e080ead8e18e6d796fe4a32a2ae562192543995fe5a17300ff6185227fb08987ef5a2ddbd9d419fa849d7df09b0e53821dc2
-
SSDEEP
6144:Kay+bnr+wp0yN90QE15F5OYc1u31g4TByJwOmCOzTOcaXWEYejiHgbp:SMrMy90Jxc1u31TTEJTOzTOcavjaMp
Static task
static1
Behavioral task
behavioral1
Sample
8b5b7c1c7c8ddaa701ea7ab88a69d437bccec01f59ec3a0e106455848eedf610.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Targets
-
-
Target
8b5b7c1c7c8ddaa701ea7ab88a69d437bccec01f59ec3a0e106455848eedf610
-
Size
309KB
-
MD5
35fe46eccd981a495d1c2ec4e8e056a7
-
SHA1
08549a9999578d4b343b643c0bd0416d8774c686
-
SHA256
8b5b7c1c7c8ddaa701ea7ab88a69d437bccec01f59ec3a0e106455848eedf610
-
SHA512
509f1ff9c165b4b61f7d61517b10e080ead8e18e6d796fe4a32a2ae562192543995fe5a17300ff6185227fb08987ef5a2ddbd9d419fa849d7df09b0e53821dc2
-
SSDEEP
6144:Kay+bnr+wp0yN90QE15F5OYc1u31g4TByJwOmCOzTOcaXWEYejiHgbp:SMrMy90Jxc1u31TTEJTOzTOcavjaMp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1