General
-
Target
49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f
-
Size
726KB
-
Sample
241106-tqrztawkbp
-
MD5
5a03b5785a7ec49111ad38b26b2ad535
-
SHA1
67d2e1cd60f1533704a821bf6b2867fa6086eb50
-
SHA256
49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f
-
SHA512
14c91d7027c667f4ee87b9d58245e61ce3a6c9e37174d07e3d643b2a267972b9ca6c94229b99f972fe6d6d59d74682c8777c7e48bf56bc8f997e35af8d1735c1
-
SSDEEP
12288:FMrHy90CxDeOs59nBSXK6byOGVwc5DINgCTo4BB7lJnBqdwZIqio50JOP:KydxyBSEGc58NgCTVBBbs2GJoyJc
Static task
static1
Behavioral task
behavioral1
Sample
49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f
-
Size
726KB
-
MD5
5a03b5785a7ec49111ad38b26b2ad535
-
SHA1
67d2e1cd60f1533704a821bf6b2867fa6086eb50
-
SHA256
49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f
-
SHA512
14c91d7027c667f4ee87b9d58245e61ce3a6c9e37174d07e3d643b2a267972b9ca6c94229b99f972fe6d6d59d74682c8777c7e48bf56bc8f997e35af8d1735c1
-
SSDEEP
12288:FMrHy90CxDeOs59nBSXK6byOGVwc5DINgCTo4BB7lJnBqdwZIqio50JOP:KydxyBSEGc58NgCTVBBbs2GJoyJc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1