General
-
Target
6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04
-
Size
500KB
-
Sample
241108-149kca1dll
-
MD5
d39a9f2eda16903129fa0c258553ad87
-
SHA1
902524360c2c19db5013ea2b71b9501e0cf331f7
-
SHA256
6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04
-
SHA512
b4af033e01db1d2f6f3b044886d0e3178d748083c548d0447cb0971ae6288992600ed8692677d03b1c9956508bccdc21775b873a3aaf2c97a8cb5d00d459eb36
-
SSDEEP
6144:Kmy+bnr+Qp0yN90QEtqybGrKyccUkS8S2pIk12u/VtSQsr40IVO6cdleaWRavXcZ:+Mrcy90vqMAy8pUu/VItNIFavrO9Nf
Static task
static1
Behavioral task
behavioral1
Sample
6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04
-
Size
500KB
-
MD5
d39a9f2eda16903129fa0c258553ad87
-
SHA1
902524360c2c19db5013ea2b71b9501e0cf331f7
-
SHA256
6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04
-
SHA512
b4af033e01db1d2f6f3b044886d0e3178d748083c548d0447cb0971ae6288992600ed8692677d03b1c9956508bccdc21775b873a3aaf2c97a8cb5d00d459eb36
-
SSDEEP
6144:Kmy+bnr+Qp0yN90QEtqybGrKyccUkS8S2pIk12u/VtSQsr40IVO6cdleaWRavXcZ:+Mrcy90vqMAy8pUu/VItNIFavrO9Nf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1