General
-
Target
31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5
-
Size
500KB
-
Sample
241105-yyernsxele
-
MD5
584603031148769c9a7d910a05427b86
-
SHA1
7c99cb0574a7c26cb340936ebcbfd846dc57c324
-
SHA256
31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5
-
SHA512
fb1f49aafe7f645200fdce8fa00950ac074a628ecb22eccf786005a750de928e6c04f20e7a1a2562043601738683f687bc5f6f8ef5ffd6680c68cc90dbcc1ed9
-
SSDEEP
6144:Key+bnr+Mp0yN90QElWQCKUFiU52q8FMFvhDX/2PJprb88gTSWhNIVrD00ZcxGcw:iMrcy90/3CKUoi4o5/2hpr7Www8c4d
Static task
static1
Behavioral task
behavioral1
Sample
31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5
-
Size
500KB
-
MD5
584603031148769c9a7d910a05427b86
-
SHA1
7c99cb0574a7c26cb340936ebcbfd846dc57c324
-
SHA256
31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5
-
SHA512
fb1f49aafe7f645200fdce8fa00950ac074a628ecb22eccf786005a750de928e6c04f20e7a1a2562043601738683f687bc5f6f8ef5ffd6680c68cc90dbcc1ed9
-
SSDEEP
6144:Key+bnr+Mp0yN90QElWQCKUFiU52q8FMFvhDX/2PJprb88gTSWhNIVrD00ZcxGcw:iMrcy90/3CKUoi4o5/2hpr7Www8c4d
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1