General
-
Target
2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a
-
Size
556KB
-
Sample
241104-qzmjxatjal
-
MD5
655a14febdf3676c12c9b490e1bafd1b
-
SHA1
ab41a43ec0be05edcc2462705ab98f0725ed7259
-
SHA256
2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a
-
SHA512
430367184c33504de8cfc3fe5dc726ef8513026cbd1f88b09e9e5ed59c96f9ed12fa2955717195be0945670385726037f7d029e4600d4b12848b195fdd95a0fe
-
SSDEEP
12288:6Mr0y90g4hHhKhTAYj0J6PMjGoQHOefMoueBQKS1:Wyb4hHAdDj00PMjWHOGu9KS1
Static task
static1
Behavioral task
behavioral1
Sample
2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Targets
-
-
Target
2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a
-
Size
556KB
-
MD5
655a14febdf3676c12c9b490e1bafd1b
-
SHA1
ab41a43ec0be05edcc2462705ab98f0725ed7259
-
SHA256
2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a
-
SHA512
430367184c33504de8cfc3fe5dc726ef8513026cbd1f88b09e9e5ed59c96f9ed12fa2955717195be0945670385726037f7d029e4600d4b12848b195fdd95a0fe
-
SSDEEP
12288:6Mr0y90g4hHhKhTAYj0J6PMjGoQHOefMoueBQKS1:Wyb4hHAdDj00PMjWHOGu9KS1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1