General
-
Target
050a2e71a0d674e0a07f3a39b70497277df3130b0d301e86f458834844096af8
-
Size
672KB
-
Sample
241104-zjdrhazkar
-
MD5
5526889a7087b080628510d2b3b25e5c
-
SHA1
b0a55e73d40604ab885d52ffec34affde0ca5c7c
-
SHA256
050a2e71a0d674e0a07f3a39b70497277df3130b0d301e86f458834844096af8
-
SHA512
10283a9761b2b6abd41bedd60706b912edcba7a023937e7d7a729c24a47f3f9b999690397534971f6405783a927789c3f7cb70ce1d5048f12706c27cbe3b7411
-
SSDEEP
12288:4MrhYy90x5B0wel0xwWmzb3pXyYLtIxd7DznqL5oqpdj4cPyRSwp:ZYyqX0ll4wRnZtIxlD7qOq3jjawwp
Static task
static1
Behavioral task
behavioral1
Sample
050a2e71a0d674e0a07f3a39b70497277df3130b0d301e86f458834844096af8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Targets
-
-
Target
050a2e71a0d674e0a07f3a39b70497277df3130b0d301e86f458834844096af8
-
Size
672KB
-
MD5
5526889a7087b080628510d2b3b25e5c
-
SHA1
b0a55e73d40604ab885d52ffec34affde0ca5c7c
-
SHA256
050a2e71a0d674e0a07f3a39b70497277df3130b0d301e86f458834844096af8
-
SHA512
10283a9761b2b6abd41bedd60706b912edcba7a023937e7d7a729c24a47f3f9b999690397534971f6405783a927789c3f7cb70ce1d5048f12706c27cbe3b7411
-
SSDEEP
12288:4MrhYy90x5B0wel0xwWmzb3pXyYLtIxd7DznqL5oqpdj4cPyRSwp:ZYyqX0ll4wRnZtIxlD7qOq3jjawwp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1