General
-
Target
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
Size
560KB
-
Sample
241104-rkk8zazpfs
-
MD5
a721237fc59826593b16e05a77c9936c
-
SHA1
498bcc6de832789d8bd6cbd941a7e62164e6c041
-
SHA256
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
SHA512
72cfb4d3bd17f84fd875f0729f5efa2cac1f32c0d39c86f404e4dc7103e2770bd93187a8c3c3bbcc75b688c4d7e10b43798a10e1097c9cb0bb8f691174c5c977
-
SSDEEP
12288:jMrGy90kTg90DFAtleqvYmb+eB853zqtd8MeLbWgnC0:FyHkeDStlzvYqsJi8MUbxC0
Static task
static1
Behavioral task
behavioral1
Sample
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
Size
560KB
-
MD5
a721237fc59826593b16e05a77c9936c
-
SHA1
498bcc6de832789d8bd6cbd941a7e62164e6c041
-
SHA256
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
SHA512
72cfb4d3bd17f84fd875f0729f5efa2cac1f32c0d39c86f404e4dc7103e2770bd93187a8c3c3bbcc75b688c4d7e10b43798a10e1097c9cb0bb8f691174c5c977
-
SSDEEP
12288:jMrGy90kTg90DFAtleqvYmb+eB853zqtd8MeLbWgnC0:FyHkeDStlzvYqsJi8MUbxC0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1