General
-
Target
06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726
-
Size
470KB
-
Sample
241105-1bz57s1pfr
-
MD5
202feaa8c225954fac9ddf01565fe2c6
-
SHA1
7e038d1d99b96b65e5237c104ca2d26c6240239f
-
SHA256
06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726
-
SHA512
8a5d8478e2bfbf64f1b6ab8eaef96c1bbcb1ca31b9312508d51bf0acb80a56a91f88303cd1b41b07ea1c360dc49d48a7b31863fb0aeab9dcf3485e10eed75566
-
SSDEEP
12288:GMrHy90Si9KS0ToEOO2OlsF4vDW/D3xMWPRh:5yw9KS0T5l2EwoDWTBRh
Static task
static1
Behavioral task
behavioral1
Sample
06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726
-
Size
470KB
-
MD5
202feaa8c225954fac9ddf01565fe2c6
-
SHA1
7e038d1d99b96b65e5237c104ca2d26c6240239f
-
SHA256
06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726
-
SHA512
8a5d8478e2bfbf64f1b6ab8eaef96c1bbcb1ca31b9312508d51bf0acb80a56a91f88303cd1b41b07ea1c360dc49d48a7b31863fb0aeab9dcf3485e10eed75566
-
SSDEEP
12288:GMrHy90Si9KS0ToEOO2OlsF4vDW/D3xMWPRh:5yw9KS0T5l2EwoDWTBRh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1