General
-
Target
6780e458a6f21559f82ebb944207f7f53059f63416650513e420035e72137d95
-
Size
483KB
-
Sample
241106-kbkshsxdjn
-
MD5
09eb1429c5d0e9666147e04febf6906d
-
SHA1
244a3c94fe352455f8c3e98a3d5c7e0611b70ee1
-
SHA256
6780e458a6f21559f82ebb944207f7f53059f63416650513e420035e72137d95
-
SHA512
a9e8399aac8d74c9a1522600f9b01673c26fb877bfeb2aa26e2639877c3d930fee57d88da350d9fa3de6e371e1f1b4aeba395dd411fb750682e70784fffe2c8d
-
SSDEEP
12288:2Mr5y90oJwnd9i1AzNSPr2w3sOUYMwPtNHhD/NpcTp5v:byrwdog0Pr13sOtMqBhe
Static task
static1
Behavioral task
behavioral1
Sample
6780e458a6f21559f82ebb944207f7f53059f63416650513e420035e72137d95.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
6780e458a6f21559f82ebb944207f7f53059f63416650513e420035e72137d95
-
Size
483KB
-
MD5
09eb1429c5d0e9666147e04febf6906d
-
SHA1
244a3c94fe352455f8c3e98a3d5c7e0611b70ee1
-
SHA256
6780e458a6f21559f82ebb944207f7f53059f63416650513e420035e72137d95
-
SHA512
a9e8399aac8d74c9a1522600f9b01673c26fb877bfeb2aa26e2639877c3d930fee57d88da350d9fa3de6e371e1f1b4aeba395dd411fb750682e70784fffe2c8d
-
SSDEEP
12288:2Mr5y90oJwnd9i1AzNSPr2w3sOUYMwPtNHhD/NpcTp5v:byrwdog0Pr13sOtMqBhe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1