General
-
Target
b37c7a92be4252134585da6c5cb7f66c996c5a775885353c38511ea349f472ef
-
Size
723KB
-
Sample
241107-r38f8atlcs
-
MD5
b5a5bd864a34b00e3f03fecb2697552b
-
SHA1
8180c1f02b9f9b6bf77471d3831b6b31fcb62f42
-
SHA256
b37c7a92be4252134585da6c5cb7f66c996c5a775885353c38511ea349f472ef
-
SHA512
a4a444c697b3e534deb7ea6ce90a25cb48ce372f8db345381fa1a64ebe0e29849bd8ddb6ea579cefac9cdefad32486f51de39071c7e46e212f3eab22510ba3e9
-
SSDEEP
12288:BMrWy908s/VrdEwMgIEQP3A5I3zkAMXXOaTBrdEYA0pNqbar2SKD54iT:7yS/FdEdwIDkA8XhpdEYAwNAoJiT
Static task
static1
Behavioral task
behavioral1
Sample
b37c7a92be4252134585da6c5cb7f66c996c5a775885353c38511ea349f472ef.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
b37c7a92be4252134585da6c5cb7f66c996c5a775885353c38511ea349f472ef
-
Size
723KB
-
MD5
b5a5bd864a34b00e3f03fecb2697552b
-
SHA1
8180c1f02b9f9b6bf77471d3831b6b31fcb62f42
-
SHA256
b37c7a92be4252134585da6c5cb7f66c996c5a775885353c38511ea349f472ef
-
SHA512
a4a444c697b3e534deb7ea6ce90a25cb48ce372f8db345381fa1a64ebe0e29849bd8ddb6ea579cefac9cdefad32486f51de39071c7e46e212f3eab22510ba3e9
-
SSDEEP
12288:BMrWy908s/VrdEwMgIEQP3A5I3zkAMXXOaTBrdEYA0pNqbar2SKD54iT:7yS/FdEdwIDkA8XhpdEYAwNAoJiT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1