General
-
Target
38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292
-
Size
724KB
-
Sample
241106-3khnmazjgv
-
MD5
d7cb04121be8f436a9412d365d9637d1
-
SHA1
edac61453cf6db08f0e0c727590da668e0dd65b1
-
SHA256
38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292
-
SHA512
a8bc7d0f005000b5b08894825d5be3f58ac29ac705a6fee7432d6dd9fe38d9e39c8f56ed64117123eba21adeeb77e1eb7c97eeb50dea1ac1ff84e22ceccb154f
-
SSDEEP
12288:PMrpy90+7NE6xViszNWuoxD2MVMIeeGscwiLAP/kCjWcGVInA8aW+A8OQODqXf1R:ayz7DV9zNxGDfVMBeGsvWA0CS1CMCJWf
Static task
static1
Behavioral task
behavioral1
Sample
38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292
-
Size
724KB
-
MD5
d7cb04121be8f436a9412d365d9637d1
-
SHA1
edac61453cf6db08f0e0c727590da668e0dd65b1
-
SHA256
38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292
-
SHA512
a8bc7d0f005000b5b08894825d5be3f58ac29ac705a6fee7432d6dd9fe38d9e39c8f56ed64117123eba21adeeb77e1eb7c97eeb50dea1ac1ff84e22ceccb154f
-
SSDEEP
12288:PMrpy90+7NE6xViszNWuoxD2MVMIeeGscwiLAP/kCjWcGVInA8aW+A8OQODqXf1R:ayz7DV9zNxGDfVMBeGsvWA0CS1CMCJWf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1