General
-
Target
116f612bae2e622c6ebdbc4ce676fb29acd3ce59126b07478a91aff78636cebc
-
Size
478KB
-
Sample
241105-xpawpaxdnn
-
MD5
5b40c7dc5e41056de579b814862d53cb
-
SHA1
a27cf47ad30a7ead745208c8acd134c46b34a243
-
SHA256
116f612bae2e622c6ebdbc4ce676fb29acd3ce59126b07478a91aff78636cebc
-
SHA512
5e698d8254a816733f0278982103c088be1ba095cef22bda3eba438acbb6a76127d215fb1c48f00064f5acb35b4c0a5844e6da313b7acb9a08e5bf24a305b806
-
SSDEEP
12288:QMrry90FysE4VqJpeXxTE7yGUqWvRFqPZpp:rytshVNX5EuGUqS8hX
Static task
static1
Behavioral task
behavioral1
Sample
116f612bae2e622c6ebdbc4ce676fb29acd3ce59126b07478a91aff78636cebc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
116f612bae2e622c6ebdbc4ce676fb29acd3ce59126b07478a91aff78636cebc
-
Size
478KB
-
MD5
5b40c7dc5e41056de579b814862d53cb
-
SHA1
a27cf47ad30a7ead745208c8acd134c46b34a243
-
SHA256
116f612bae2e622c6ebdbc4ce676fb29acd3ce59126b07478a91aff78636cebc
-
SHA512
5e698d8254a816733f0278982103c088be1ba095cef22bda3eba438acbb6a76127d215fb1c48f00064f5acb35b4c0a5844e6da313b7acb9a08e5bf24a305b806
-
SSDEEP
12288:QMrry90FysE4VqJpeXxTE7yGUqWvRFqPZpp:rytshVNX5EuGUqS8hX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1