General
-
Target
43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1
-
Size
482KB
-
Sample
241108-2eh7jazra1
-
MD5
7a1ee78787a3033a69e2c5b18a14dbdb
-
SHA1
f6fb01dac88abb87a71f802535a961dca369f48e
-
SHA256
43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1
-
SHA512
918a817a63124a5012b41520cd475a6c6618e02ab68cb871fe8f600a0f98d35aec20b4fc1bb9ea9893763fce839ebd5e98be8da2200043e7097684aa885ae341
-
SSDEEP
12288:gMrAy90CkqNve8m9qlG/0HDQKaUvp9pec1rPah7Bl4z:wyfdlmQeU7aWprecQiz
Static task
static1
Behavioral task
behavioral1
Sample
43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1
-
Size
482KB
-
MD5
7a1ee78787a3033a69e2c5b18a14dbdb
-
SHA1
f6fb01dac88abb87a71f802535a961dca369f48e
-
SHA256
43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1
-
SHA512
918a817a63124a5012b41520cd475a6c6618e02ab68cb871fe8f600a0f98d35aec20b4fc1bb9ea9893763fce839ebd5e98be8da2200043e7097684aa885ae341
-
SSDEEP
12288:gMrAy90CkqNve8m9qlG/0HDQKaUvp9pec1rPah7Bl4z:wyfdlmQeU7aWprecQiz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1