General
-
Target
3e1b02d7e4291c1614b24f8da0065ac6523aa03c9d9530ab23b40d1715f0a339
-
Size
427KB
-
Sample
241106-k24y3sxdqa
-
MD5
88192ec366d49ce1045799e8b3588ab9
-
SHA1
7d6cd3a29abbd04e9a8487cde0a3f5aca31cf206
-
SHA256
3e1b02d7e4291c1614b24f8da0065ac6523aa03c9d9530ab23b40d1715f0a339
-
SHA512
d4d11b453ff1d7da7725c4fab6e475cc2fb2c3cc357bdd7dc1f10b356c0a0e7ab3a2176f79f5d2b4b17e740db1b9687eac63f4c217071261806acc81fc1a5dd5
-
SSDEEP
12288:txM6IcEEyosBOsm7j5WSeX42NbvR7r/Tz2A:ELcEEDsBrmBA42tFT2A
Static task
static1
Behavioral task
behavioral1
Sample
60081851064ffef2f4af66c9a9ab0728f99bfcae4195ed8f35303e7f96f45dc2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
60081851064ffef2f4af66c9a9ab0728f99bfcae4195ed8f35303e7f96f45dc2.exe
-
Size
478KB
-
MD5
9ee89d7bf9723030c887388e254173f7
-
SHA1
cb71db3e6000f291eb83d3864fab548611f3d016
-
SHA256
60081851064ffef2f4af66c9a9ab0728f99bfcae4195ed8f35303e7f96f45dc2
-
SHA512
8ea0d9d7c540cd3c58337048e411108517c4f1f92ba135baf5ec4bf5a46bdc59c423d2b61b8ba065a94d0bb28b381abe9ae6479f6fee2a787ddaefa7f3e8b2d2
-
SSDEEP
6144:KZy+bnr+lp0yN90QESRPoBHFQ3+U/sG5hPjZL34MhMvUurK0aZB3PH/JwuTkRkMp:TMrFy90jmuUEGnPjZH9Q1aZVX2KYp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1