General
-
Target
263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2
-
Size
478KB
-
Sample
241105-xs9jeswfpd
-
MD5
a39e354faa475771a5237266bb35ed12
-
SHA1
b29a114741026ac1985a1c5d54c977ae963df84e
-
SHA256
263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2
-
SHA512
a0e101fdd1f9b67573ca849a51e4f8aa0d2001c9c72c3f125477ffea0e5631cfebb1712b03a95572e0f4c9e7f37cb3f82894b03d2ffdaccbc61d854d234f8030
-
SSDEEP
12288:uMrty90cJlVJGiI8Yq5WGO/RhdqLl2NDxOaQ:/y3PV0iI8J0tI+On
Static task
static1
Behavioral task
behavioral1
Sample
263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2
-
Size
478KB
-
MD5
a39e354faa475771a5237266bb35ed12
-
SHA1
b29a114741026ac1985a1c5d54c977ae963df84e
-
SHA256
263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2
-
SHA512
a0e101fdd1f9b67573ca849a51e4f8aa0d2001c9c72c3f125477ffea0e5631cfebb1712b03a95572e0f4c9e7f37cb3f82894b03d2ffdaccbc61d854d234f8030
-
SSDEEP
12288:uMrty90cJlVJGiI8Yq5WGO/RhdqLl2NDxOaQ:/y3PV0iI8J0tI+On
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1