General
-
Target
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81
-
Size
903KB
-
Sample
250213-g9g8hatqhj
-
MD5
7a964d6ea7034f53e6e798de342829a3
-
SHA1
662bcaa92fe73b553e6050a44936bfcbdc19e648
-
SHA256
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81
-
SHA512
78a666e512dc92604e70fc1fd02485a65aca41672fb63a587efbe9d7f67216e8225be975bd50ca413345e8e7f6a8f2e7b442bb03549b9197e2c2ab0661c5dd9c
-
SSDEEP
24576:+ywoD049O8k0+D/+ExZWHhtQbwRWrSyz34J3f3x:NwoIIZk0+nxwHhWbwRbx
Static task
static1
Behavioral task
behavioral1
Sample
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Extracted
redline
dubnar
193.233.20.17:4139
-
auth_value
2aa4eb46ad52c4058f24c70a9e67889a
Targets
-
-
Target
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81
-
Size
903KB
-
MD5
7a964d6ea7034f53e6e798de342829a3
-
SHA1
662bcaa92fe73b553e6050a44936bfcbdc19e648
-
SHA256
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81
-
SHA512
78a666e512dc92604e70fc1fd02485a65aca41672fb63a587efbe9d7f67216e8225be975bd50ca413345e8e7f6a8f2e7b442bb03549b9197e2c2ab0661c5dd9c
-
SSDEEP
24576:+ywoD049O8k0+D/+ExZWHhtQbwRWrSyz34J3f3x:NwoIIZk0+nxwHhWbwRbx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4