General
-
Target
e690c11d3a6a89fcfe0dace78008a073cded2950b358df904bdcafe24bb1f1d2
-
Size
569KB
-
Sample
241104-rgypws1bqa
-
MD5
22125275024c56f30891898046b0b44d
-
SHA1
80e0686211aeebae3ee223c1cc248611850206ae
-
SHA256
e690c11d3a6a89fcfe0dace78008a073cded2950b358df904bdcafe24bb1f1d2
-
SHA512
e499e30a5b8f0e9c79a20a3ec9ca9a7a04623fe11aac24aa3be95a4f80f037f8060ffc26c7c73987ad5b0e2df1a001a9ac00f79bd33fbe1ba67c22bc630db199
-
SSDEEP
12288:7Mr/y90Sahimz7AuxqVgVQWL1ZOQ3F3712yGgww:QyzsVAuxYgq6ZOQ3F37YY
Static task
static1
Behavioral task
behavioral1
Sample
e690c11d3a6a89fcfe0dace78008a073cded2950b358df904bdcafe24bb1f1d2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
e690c11d3a6a89fcfe0dace78008a073cded2950b358df904bdcafe24bb1f1d2
-
Size
569KB
-
MD5
22125275024c56f30891898046b0b44d
-
SHA1
80e0686211aeebae3ee223c1cc248611850206ae
-
SHA256
e690c11d3a6a89fcfe0dace78008a073cded2950b358df904bdcafe24bb1f1d2
-
SHA512
e499e30a5b8f0e9c79a20a3ec9ca9a7a04623fe11aac24aa3be95a4f80f037f8060ffc26c7c73987ad5b0e2df1a001a9ac00f79bd33fbe1ba67c22bc630db199
-
SSDEEP
12288:7Mr/y90Sahimz7AuxqVgVQWL1ZOQ3F3712yGgww:QyzsVAuxYgq6ZOQ3F37YY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1