General
-
Target
d5f5847b2abc006e528e0f977d7c59ead08d0e5a0fff9090ff2a0ed92bf7bd9f
-
Size
500KB
-
Sample
241106-qq281atkan
-
MD5
f0e6104347a33b622c456a47a3b801d0
-
SHA1
0ae51c90d2638e0310bb0a4a7d89dfcdbb8c3ba6
-
SHA256
d5f5847b2abc006e528e0f977d7c59ead08d0e5a0fff9090ff2a0ed92bf7bd9f
-
SHA512
63de53828f0ed61acee1e0eeb2e71fcd3c5a2457af0cb575d51775185ba27293dc7d4e3fabc44505312b63111acf530d1cce7cce909dc033477a38fd88e53d3a
-
SSDEEP
6144:Kty+bnr+Mp0yN90QEgm/TgC9Yee57vAA3WahJY/d1xRmJmM98QAaIyWfYx5ViLzC:jMr0y90deeU7h3/W/niZ0gzbZ
Static task
static1
Behavioral task
behavioral1
Sample
d5f5847b2abc006e528e0f977d7c59ead08d0e5a0fff9090ff2a0ed92bf7bd9f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
d5f5847b2abc006e528e0f977d7c59ead08d0e5a0fff9090ff2a0ed92bf7bd9f
-
Size
500KB
-
MD5
f0e6104347a33b622c456a47a3b801d0
-
SHA1
0ae51c90d2638e0310bb0a4a7d89dfcdbb8c3ba6
-
SHA256
d5f5847b2abc006e528e0f977d7c59ead08d0e5a0fff9090ff2a0ed92bf7bd9f
-
SHA512
63de53828f0ed61acee1e0eeb2e71fcd3c5a2457af0cb575d51775185ba27293dc7d4e3fabc44505312b63111acf530d1cce7cce909dc033477a38fd88e53d3a
-
SSDEEP
6144:Kty+bnr+Mp0yN90QEgm/TgC9Yee57vAA3WahJY/d1xRmJmM98QAaIyWfYx5ViLzC:jMr0y90deeU7h3/W/niZ0gzbZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1