General
-
Target
f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9
-
Size
482KB
-
Sample
241104-3sg23azdrh
-
MD5
f7298cdce21a966bdecbab29b599149c
-
SHA1
1256ca2f252442445729d52d06b2bdf874d425dd
-
SHA256
f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9
-
SHA512
ea98f0ffd7224eab2d3901d978261fdd4b4ed3e34e40314929643dd3bd8abf80fb1acbb344e220cc7ee4dd2a7570dede47309b52af9be56cf652b0b840f14a3d
-
SSDEEP
12288:pMr0y90yREBxjhM9fE7Ao+E1ckMi8RYb9U31N:ZykBxjhM9fLo+E1ckNUFN
Static task
static1
Behavioral task
behavioral1
Sample
f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9
-
Size
482KB
-
MD5
f7298cdce21a966bdecbab29b599149c
-
SHA1
1256ca2f252442445729d52d06b2bdf874d425dd
-
SHA256
f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9
-
SHA512
ea98f0ffd7224eab2d3901d978261fdd4b4ed3e34e40314929643dd3bd8abf80fb1acbb344e220cc7ee4dd2a7570dede47309b52af9be56cf652b0b840f14a3d
-
SSDEEP
12288:pMr0y90yREBxjhM9fE7Ao+E1ckMi8RYb9U31N:ZykBxjhM9fLo+E1ckNUFN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1