General
-
Target
bbda69b81a8af568e87e1bc5da6ba20675dba0ec28835941226bb7d1bf4ae3a0
-
Size
549KB
-
Sample
241104-qlyp1ssqbq
-
MD5
4f9276421b9e4efba5e5ff196e2a2ccc
-
SHA1
d2be6627f98484fd830fe1d993042bb4b3428b4b
-
SHA256
bbda69b81a8af568e87e1bc5da6ba20675dba0ec28835941226bb7d1bf4ae3a0
-
SHA512
42913864e7aac3bd5ae726702f62bb4199adadb68d757bf3d0865ed253700b4d973baddaf45d36641e5f2d4f19fc9a79b938a7f36819d040a90aaaa97ba61fd9
-
SSDEEP
12288:XMr7y90Dsh3KVsPwWSaH6bxw0HX7jJvVObt3/gj:4y+so2dSaHCxXrjnW3Y
Static task
static1
Behavioral task
behavioral1
Sample
bbda69b81a8af568e87e1bc5da6ba20675dba0ec28835941226bb7d1bf4ae3a0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
bbda69b81a8af568e87e1bc5da6ba20675dba0ec28835941226bb7d1bf4ae3a0
-
Size
549KB
-
MD5
4f9276421b9e4efba5e5ff196e2a2ccc
-
SHA1
d2be6627f98484fd830fe1d993042bb4b3428b4b
-
SHA256
bbda69b81a8af568e87e1bc5da6ba20675dba0ec28835941226bb7d1bf4ae3a0
-
SHA512
42913864e7aac3bd5ae726702f62bb4199adadb68d757bf3d0865ed253700b4d973baddaf45d36641e5f2d4f19fc9a79b938a7f36819d040a90aaaa97ba61fd9
-
SSDEEP
12288:XMr7y90Dsh3KVsPwWSaH6bxw0HX7jJvVObt3/gj:4y+so2dSaHCxXrjnW3Y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1