General
-
Target
3673e6bd432f8cd8614783aac1420754bb99b506f598f9977d7ef1eb5e6ab9d4
-
Size
399KB
-
Sample
241228-1gc8masqhm
-
MD5
3b681ca6108610d1e7d8b5190bacc2d6
-
SHA1
999a450735d985dd46cdd467ce845d440526fc98
-
SHA256
3673e6bd432f8cd8614783aac1420754bb99b506f598f9977d7ef1eb5e6ab9d4
-
SHA512
d2ae3a5a5ab56b97dee75686d2aa4d054b8a25eda98df4aff04ef2e594320abb2fdbfb20305f682424ffdf38cd018c8530e35425d22836cc6763327a7a20a648
-
SSDEEP
12288:rMrmy90+kwXifFewYeEHJ3FVJS3m4zQU2:Ny4wsFWx1KW4y
Static task
static1
Behavioral task
behavioral1
Sample
3673e6bd432f8cd8614783aac1420754bb99b506f598f9977d7ef1eb5e6ab9d4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
3673e6bd432f8cd8614783aac1420754bb99b506f598f9977d7ef1eb5e6ab9d4
-
Size
399KB
-
MD5
3b681ca6108610d1e7d8b5190bacc2d6
-
SHA1
999a450735d985dd46cdd467ce845d440526fc98
-
SHA256
3673e6bd432f8cd8614783aac1420754bb99b506f598f9977d7ef1eb5e6ab9d4
-
SHA512
d2ae3a5a5ab56b97dee75686d2aa4d054b8a25eda98df4aff04ef2e594320abb2fdbfb20305f682424ffdf38cd018c8530e35425d22836cc6763327a7a20a648
-
SSDEEP
12288:rMrmy90+kwXifFewYeEHJ3FVJS3m4zQU2:Ny4wsFWx1KW4y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1