General
-
Target
04b5111914b0ca11fb86c4151e4bd3ace9ee0c75ee0aa2fdf3b67881ba8e94f4
-
Size
478KB
-
Sample
241107-pe1elavkak
-
MD5
8692d2c5fb35a9da73b7c901ca492137
-
SHA1
dc65424197b76c65912afccfc39a26e1ee093a61
-
SHA256
04b5111914b0ca11fb86c4151e4bd3ace9ee0c75ee0aa2fdf3b67881ba8e94f4
-
SHA512
12d0133d21dc72822af97844cdad7dd487fe6f00d2dbd8fe768ea535cd25c922b7c363956dfad4c5cac9060c8426911de80c4e4cec1122784ab6bd548055863c
-
SSDEEP
12288:sMrUy906vbfi7DkInpdXt565VxktvmY8Ew:oy9bfiHkInpdXtoVe+Y83
Static task
static1
Behavioral task
behavioral1
Sample
04b5111914b0ca11fb86c4151e4bd3ace9ee0c75ee0aa2fdf3b67881ba8e94f4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
04b5111914b0ca11fb86c4151e4bd3ace9ee0c75ee0aa2fdf3b67881ba8e94f4
-
Size
478KB
-
MD5
8692d2c5fb35a9da73b7c901ca492137
-
SHA1
dc65424197b76c65912afccfc39a26e1ee093a61
-
SHA256
04b5111914b0ca11fb86c4151e4bd3ace9ee0c75ee0aa2fdf3b67881ba8e94f4
-
SHA512
12d0133d21dc72822af97844cdad7dd487fe6f00d2dbd8fe768ea535cd25c922b7c363956dfad4c5cac9060c8426911de80c4e4cec1122784ab6bd548055863c
-
SSDEEP
12288:sMrUy906vbfi7DkInpdXt565VxktvmY8Ew:oy9bfiHkInpdXtoVe+Y83
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1