General
-
Target
c79c30fd1c7743eccf894ed23d8b5da397bcd6399f045e743bc64801fe04023a
-
Size
855KB
-
Sample
241104-q2gfns1djj
-
MD5
ba29478cfd32e435d3d922c3f4ba2a5c
-
SHA1
533f4087d2962cd369c8648215f3223897c31690
-
SHA256
c79c30fd1c7743eccf894ed23d8b5da397bcd6399f045e743bc64801fe04023a
-
SHA512
9e34db8bb350dd290859befd77df7f5596fd3ac29ce17d3cc04a56f143b225d9a96d186e2955a400ab77cc10d9cde862e7ddfaef7a897813abf01f4b3968c6cd
-
SSDEEP
12288:8Mrgy909dxyi5hBrWtkNT1klvH6ExlDIlDtPaesSpZNLy6q:cySdxfCiNBqxQtPHdZN+J
Static task
static1
Behavioral task
behavioral1
Sample
c79c30fd1c7743eccf894ed23d8b5da397bcd6399f045e743bc64801fe04023a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
c79c30fd1c7743eccf894ed23d8b5da397bcd6399f045e743bc64801fe04023a
-
Size
855KB
-
MD5
ba29478cfd32e435d3d922c3f4ba2a5c
-
SHA1
533f4087d2962cd369c8648215f3223897c31690
-
SHA256
c79c30fd1c7743eccf894ed23d8b5da397bcd6399f045e743bc64801fe04023a
-
SHA512
9e34db8bb350dd290859befd77df7f5596fd3ac29ce17d3cc04a56f143b225d9a96d186e2955a400ab77cc10d9cde862e7ddfaef7a897813abf01f4b3968c6cd
-
SSDEEP
12288:8Mrgy909dxyi5hBrWtkNT1klvH6ExlDIlDtPaesSpZNLy6q:cySdxfCiNBqxQtPHdZN+J
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1