General
-
Target
689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322
-
Size
482KB
-
Sample
241105-gsljlavqfs
-
MD5
369e4c5ea3554a047f11645639498987
-
SHA1
ca741011023202eda734baa9aa680dba24f2c84a
-
SHA256
689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322
-
SHA512
ecad3db535b1125ce1bf441a3ec0430807c34aea292251aa276fa852d35269ce18f9fadecca1be93a8c6529c10e173ef210e7180487660d9d3f524f951675130
-
SSDEEP
12288:JMriy90NZfOdE7tmWyzxp7Kjd8kUtDQKaUbp9pec1rPat79VJC:nyVs7ylpOjd8kg7aUprecQ/i
Static task
static1
Behavioral task
behavioral1
Sample
689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322
-
Size
482KB
-
MD5
369e4c5ea3554a047f11645639498987
-
SHA1
ca741011023202eda734baa9aa680dba24f2c84a
-
SHA256
689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322
-
SHA512
ecad3db535b1125ce1bf441a3ec0430807c34aea292251aa276fa852d35269ce18f9fadecca1be93a8c6529c10e173ef210e7180487660d9d3f524f951675130
-
SSDEEP
12288:JMriy90NZfOdE7tmWyzxp7Kjd8kUtDQKaUbp9pec1rPat79VJC:nyVs7ylpOjd8kg7aUprecQ/i
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1