General
-
Target
02bd3ac67bef1e7c974376621d04c02f9fa8018a7bf84699d4ee27e8d9f95fe1N.exe
-
Size
655KB
-
Sample
250205-fbb36azpf1
-
MD5
31a1110abd20f7c7d52f1a258fdc7c10
-
SHA1
24cc9b3a4dbe1d764c4db4b0eed7d26ad9102abc
-
SHA256
02bd3ac67bef1e7c974376621d04c02f9fa8018a7bf84699d4ee27e8d9f95fe1
-
SHA512
8b2a2803399db47a6d005d5a4cf6217894cc202dd8c719306b0456927f649b77c4681be9f6797373c2535a1722b21c1ecb551f6020e76506c7b61891a73117f8
-
SSDEEP
12288:WMr3y902DwjtaxlmeqjZ2GyDWfngehn2Ck2gbn1iVzKfy:dy99xlmXjGGgY2WgD1+zD
Static task
static1
Behavioral task
behavioral1
Sample
02bd3ac67bef1e7c974376621d04c02f9fa8018a7bf84699d4ee27e8d9f95fe1N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
02bd3ac67bef1e7c974376621d04c02f9fa8018a7bf84699d4ee27e8d9f95fe1N.exe
-
Size
655KB
-
MD5
31a1110abd20f7c7d52f1a258fdc7c10
-
SHA1
24cc9b3a4dbe1d764c4db4b0eed7d26ad9102abc
-
SHA256
02bd3ac67bef1e7c974376621d04c02f9fa8018a7bf84699d4ee27e8d9f95fe1
-
SHA512
8b2a2803399db47a6d005d5a4cf6217894cc202dd8c719306b0456927f649b77c4681be9f6797373c2535a1722b21c1ecb551f6020e76506c7b61891a73117f8
-
SSDEEP
12288:WMr3y902DwjtaxlmeqjZ2GyDWfngehn2Ck2gbn1iVzKfy:dy99xlmXjGGgY2WgD1+zD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4