General
-
Target
8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f
-
Size
470KB
-
Sample
241105-y2mxfsxfka
-
MD5
9da38838bc76e8d771ac4726f2129a34
-
SHA1
891d201175bc6fe4bddff0cfbc2caf8d4fb9654d
-
SHA256
8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f
-
SHA512
aa4074482b229aff6f3052e2ffbbaa655b195d7e14c74f34bff2bd26b67abad5a1a6cd4045dcb0c4f663c4df07f0bf10617c1ed8cc7030fbb69fe7d3bdfe8b02
-
SSDEEP
12288:4Mrvy90IBKtUfldEtQHIHAgqiV73q1HD5ALhdB:Hy/K2fldRIHRqiVbqTAldB
Static task
static1
Behavioral task
behavioral1
Sample
8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f
-
Size
470KB
-
MD5
9da38838bc76e8d771ac4726f2129a34
-
SHA1
891d201175bc6fe4bddff0cfbc2caf8d4fb9654d
-
SHA256
8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f
-
SHA512
aa4074482b229aff6f3052e2ffbbaa655b195d7e14c74f34bff2bd26b67abad5a1a6cd4045dcb0c4f663c4df07f0bf10617c1ed8cc7030fbb69fe7d3bdfe8b02
-
SSDEEP
12288:4Mrvy90IBKtUfldEtQHIHAgqiV73q1HD5ALhdB:Hy/K2fldRIHRqiVbqTAldB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1