General
-
Target
9d67b8765dc316ef8ab62bfa09b5219ae768eb62dd018379fd87183bf27d1ca3
-
Size
483KB
-
Sample
241106-zvc94sybpm
-
MD5
3eb776f107b0fb17d663253a1203308b
-
SHA1
a99b633b69b968852ba75762b4cbcaf3df0a8e9e
-
SHA256
9d67b8765dc316ef8ab62bfa09b5219ae768eb62dd018379fd87183bf27d1ca3
-
SHA512
05648219891c361c9923394f65921fe87069ca56ae97be50213481c49e1af7f5347fb16f13552dd96f5e46d8c1fbd98af0245260cbd23c60e14842131801feb6
-
SSDEEP
12288:cMrHKy90P9lWGNBrwBuiqMc7ps78Aw5n1S/wYEE:DKyijxfUBuiqH7pDAw5n10Tb
Static task
static1
Behavioral task
behavioral1
Sample
9d67b8765dc316ef8ab62bfa09b5219ae768eb62dd018379fd87183bf27d1ca3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
9d67b8765dc316ef8ab62bfa09b5219ae768eb62dd018379fd87183bf27d1ca3
-
Size
483KB
-
MD5
3eb776f107b0fb17d663253a1203308b
-
SHA1
a99b633b69b968852ba75762b4cbcaf3df0a8e9e
-
SHA256
9d67b8765dc316ef8ab62bfa09b5219ae768eb62dd018379fd87183bf27d1ca3
-
SHA512
05648219891c361c9923394f65921fe87069ca56ae97be50213481c49e1af7f5347fb16f13552dd96f5e46d8c1fbd98af0245260cbd23c60e14842131801feb6
-
SSDEEP
12288:cMrHKy90P9lWGNBrwBuiqMc7ps78Aw5n1S/wYEE:DKyijxfUBuiqH7pDAw5n10Tb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1