General
-
Target
1b529b9522ee4c5cbd280ae16dacaaabc4111d95db7f771e2e344771b5498f85
-
Size
470KB
-
Sample
241105-h68fysxare
-
MD5
9a85c402706b2eeb9d8dbcec0bc6bb5d
-
SHA1
6a859ade2196986523f63b33627b8eaadf6db28e
-
SHA256
1b529b9522ee4c5cbd280ae16dacaaabc4111d95db7f771e2e344771b5498f85
-
SHA512
412a18e94ff3ede2f6abd85cfc1530d57b4eafc55faf09363a473c4f3763d22656c6c7406c3bba98e80696b8df0bfc7e39629dca9a4824d07d483ea229274ec0
-
SSDEEP
6144:K9y+bnr+Zp0yN90QEz1NM1x9O6kl2K8q8FrwsCV5M/6CDT8w+ybdaEHCRm8aZkQ9:/Mrly90Zg1xQ4VFrPCVW/D3JkWPZr
Static task
static1
Behavioral task
behavioral1
Sample
1b529b9522ee4c5cbd280ae16dacaaabc4111d95db7f771e2e344771b5498f85.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
1b529b9522ee4c5cbd280ae16dacaaabc4111d95db7f771e2e344771b5498f85
-
Size
470KB
-
MD5
9a85c402706b2eeb9d8dbcec0bc6bb5d
-
SHA1
6a859ade2196986523f63b33627b8eaadf6db28e
-
SHA256
1b529b9522ee4c5cbd280ae16dacaaabc4111d95db7f771e2e344771b5498f85
-
SHA512
412a18e94ff3ede2f6abd85cfc1530d57b4eafc55faf09363a473c4f3763d22656c6c7406c3bba98e80696b8df0bfc7e39629dca9a4824d07d483ea229274ec0
-
SSDEEP
6144:K9y+bnr+Zp0yN90QEz1NM1x9O6kl2K8q8FrwsCV5M/6CDT8w+ybdaEHCRm8aZkQ9:/Mrly90Zg1xQ4VFrPCVW/D3JkWPZr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1