General
-
Target
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39
-
Size
1.3MB
-
Sample
250118-z42ztswjhn
-
MD5
7980d99f45fbdbce92c3c62a0332b376
-
SHA1
6694940c2f13486c0a1bc76b0cd35c90687b2537
-
SHA256
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39
-
SHA512
1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2
-
SSDEEP
24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
redko
62.204.41.170:4179
-
auth_value
9bcf7b0620ff067017d66b9a5d80b547
Targets
-
-
Target
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39
-
Size
1.3MB
-
MD5
7980d99f45fbdbce92c3c62a0332b376
-
SHA1
6694940c2f13486c0a1bc76b0cd35c90687b2537
-
SHA256
20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39
-
SHA512
1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2
-
SSDEEP
24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1