General
-
Target
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7
-
Size
526KB
-
Sample
241104-q5x8lazhqe
-
MD5
22c4f615f759c62c5d554a00f83c1df7
-
SHA1
00d83d37bdb747fb1ed226bf73ff562a32271fd2
-
SHA256
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7
-
SHA512
988001ecb975a6b7d631754d65f2f2df8fb22c9628b85e058367f4d53ce21e2fe978cf1a5f5365cd5f9c402813664f4610366b314b9f6604665d2894bf9328eb
-
SSDEEP
12288:gMrBy90095knw1RZQubAI+JMaalfrmITyNL:xy1UwxB+JMwNL
Static task
static1
Behavioral task
behavioral1
Sample
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7
-
Size
526KB
-
MD5
22c4f615f759c62c5d554a00f83c1df7
-
SHA1
00d83d37bdb747fb1ed226bf73ff562a32271fd2
-
SHA256
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7
-
SHA512
988001ecb975a6b7d631754d65f2f2df8fb22c9628b85e058367f4d53ce21e2fe978cf1a5f5365cd5f9c402813664f4610366b314b9f6604665d2894bf9328eb
-
SSDEEP
12288:gMrBy90095knw1RZQubAI+JMaalfrmITyNL:xy1UwxB+JMwNL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1