General
-
Target
12dc564f6d5bd21314e04fcd2f1ff92eaa7bba39a182e518c2d2072a813b2053
-
Size
700KB
-
Sample
241104-rehwnatlbn
-
MD5
8b2f137f1551a81725a674b393b964e1
-
SHA1
874e53dd80ae90faa1fceba3902428a9a2b9e586
-
SHA256
12dc564f6d5bd21314e04fcd2f1ff92eaa7bba39a182e518c2d2072a813b2053
-
SHA512
a7dbad05cceda2993331c9f061d3df455c3312e1f39d4069327e77d8a555c150f7970b87136ccdb518bda8ff26d2f15ae715897741b9d71662bbd2921c7d93ce
-
SSDEEP
12288:+Mrjy90H7ngPY40tohBYt0WYk73S4jJ4QGoyUQ28LtpTv+qxc3:5yA794I7tik73Sm4QGjnT7b+ag
Static task
static1
Behavioral task
behavioral1
Sample
12dc564f6d5bd21314e04fcd2f1ff92eaa7bba39a182e518c2d2072a813b2053.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Targets
-
-
Target
12dc564f6d5bd21314e04fcd2f1ff92eaa7bba39a182e518c2d2072a813b2053
-
Size
700KB
-
MD5
8b2f137f1551a81725a674b393b964e1
-
SHA1
874e53dd80ae90faa1fceba3902428a9a2b9e586
-
SHA256
12dc564f6d5bd21314e04fcd2f1ff92eaa7bba39a182e518c2d2072a813b2053
-
SHA512
a7dbad05cceda2993331c9f061d3df455c3312e1f39d4069327e77d8a555c150f7970b87136ccdb518bda8ff26d2f15ae715897741b9d71662bbd2921c7d93ce
-
SSDEEP
12288:+Mrjy90H7ngPY40tohBYt0WYk73S4jJ4QGoyUQ28LtpTv+qxc3:5yA794I7tik73Sm4QGjnT7b+ag
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1