General
-
Target
e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1
-
Size
470KB
-
Sample
241107-dbjf5athpq
-
MD5
a8e9cd09597f7c1d79485c2bc72ed031
-
SHA1
421603709b0460dea5ac3f49c7842cc8848be715
-
SHA256
e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1
-
SHA512
bd7bd1b84535e5d94f9690abf76d24f99decd6e32ac6f93e385477ad7d048c9893b1b7a8d37c98ec3c909aa8e63a7f04d34d6a44bff30eaefad1fb42aa98f78d
-
SSDEEP
12288:PMrVy90HK6Ao9ZNrR6ihDU8GBjHyNbSlWul+VwjUoAZ:+yOZNR6+cHl5+VOUoY
Static task
static1
Behavioral task
behavioral1
Sample
e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1
-
Size
470KB
-
MD5
a8e9cd09597f7c1d79485c2bc72ed031
-
SHA1
421603709b0460dea5ac3f49c7842cc8848be715
-
SHA256
e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1
-
SHA512
bd7bd1b84535e5d94f9690abf76d24f99decd6e32ac6f93e385477ad7d048c9893b1b7a8d37c98ec3c909aa8e63a7f04d34d6a44bff30eaefad1fb42aa98f78d
-
SSDEEP
12288:PMrVy90HK6Ao9ZNrR6ihDU8GBjHyNbSlWul+VwjUoAZ:+yOZNR6+cHl5+VOUoY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1