General
-
Target
eec220aed75d448cdc530b2447ecfdd6885ba814f47e1e045b48c37f197327da
-
Size
724KB
-
Sample
241107-tq5kxaxrfj
-
MD5
b5366a65ddde51f236d55acdff84dd6f
-
SHA1
4e18fb7d2cc1b79ef66f093059436da3747577aa
-
SHA256
eec220aed75d448cdc530b2447ecfdd6885ba814f47e1e045b48c37f197327da
-
SHA512
2994c35f9072f99ad34466c8639de96e7a8d0e4b35f8cef6ae5bef65486e85f1132de30e0b9bc3788aa0ad7f6e465a3f0c8bf089d81b102d8c7b6731100af0ee
-
SSDEEP
12288:wMrdy90ZYeas9raJvDI53CfS0ZIWlBpAP/kIjWcGW/8A7rW+Oi2QhJSH2zT:9yaYElaJcCfHZIW7pA0IS1rW2i26U2zT
Static task
static1
Behavioral task
behavioral1
Sample
eec220aed75d448cdc530b2447ecfdd6885ba814f47e1e045b48c37f197327da.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
eec220aed75d448cdc530b2447ecfdd6885ba814f47e1e045b48c37f197327da
-
Size
724KB
-
MD5
b5366a65ddde51f236d55acdff84dd6f
-
SHA1
4e18fb7d2cc1b79ef66f093059436da3747577aa
-
SHA256
eec220aed75d448cdc530b2447ecfdd6885ba814f47e1e045b48c37f197327da
-
SHA512
2994c35f9072f99ad34466c8639de96e7a8d0e4b35f8cef6ae5bef65486e85f1132de30e0b9bc3788aa0ad7f6e465a3f0c8bf089d81b102d8c7b6731100af0ee
-
SSDEEP
12288:wMrdy90ZYeas9raJvDI53CfS0ZIWlBpAP/kIjWcGW/8A7rW+Oi2QhJSH2zT:9yaYElaJcCfHZIW7pA0IS1rW2i26U2zT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1