General
-
Target
9874ba2b246ac383bb55c1cb5b0ac903090d75f4054f7a40841770846d6d41fd
-
Size
483KB
-
Sample
241106-w62v3avjfw
-
MD5
e1887b2c2799f251f9dcea2d190fb45c
-
SHA1
76b373a213f76619cd5a832ce5408b9972c33ee4
-
SHA256
9874ba2b246ac383bb55c1cb5b0ac903090d75f4054f7a40841770846d6d41fd
-
SHA512
0a125b26e93323042f7d23e520eec1934cd5761eb4d85007fb4d43e647c5935e3c1b6bc7f5fbfc78cbe88b8970e45fb778cfe47f52443bbf52d7c50a9c25e678
-
SSDEEP
12288:yMrdy906fZbTgXrwLx9wUmEsKtdm+V9RSdD/PEs2/0Uy:bynx3Mex9wFtKtXUN/2ch
Static task
static1
Behavioral task
behavioral1
Sample
9874ba2b246ac383bb55c1cb5b0ac903090d75f4054f7a40841770846d6d41fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
9874ba2b246ac383bb55c1cb5b0ac903090d75f4054f7a40841770846d6d41fd
-
Size
483KB
-
MD5
e1887b2c2799f251f9dcea2d190fb45c
-
SHA1
76b373a213f76619cd5a832ce5408b9972c33ee4
-
SHA256
9874ba2b246ac383bb55c1cb5b0ac903090d75f4054f7a40841770846d6d41fd
-
SHA512
0a125b26e93323042f7d23e520eec1934cd5761eb4d85007fb4d43e647c5935e3c1b6bc7f5fbfc78cbe88b8970e45fb778cfe47f52443bbf52d7c50a9c25e678
-
SSDEEP
12288:yMrdy906fZbTgXrwLx9wUmEsKtdm+V9RSdD/PEs2/0Uy:bynx3Mex9wFtKtXUN/2ch
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1