General
-
Target
9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee
-
Size
481KB
-
Sample
241108-c85j7atdrm
-
MD5
902723a8b1bb34619fcb676d6a7e7156
-
SHA1
b85c2021e7f3f3f0875bbeb7fb70f1f0bb23c0a0
-
SHA256
9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee
-
SHA512
a410aeeb7f8a3b96dcedc5980e4d38195cfe0fad38fa4bf62d4020caa9f66df7e61c0798887547c55ecb32d049fdc30337bccaa14a4c4cfd7361f690a3969f81
-
SSDEEP
6144:KBy+bnr+yp0yN90QESBe2p32vxv2PHZCuj/U9FTOMaeDuGDMQM2c8HXFtSo5z9WO:rMrOy90cpGvkHBDcFTW4uRQw8z5ZWSV
Static task
static1
Behavioral task
behavioral1
Sample
9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee
-
Size
481KB
-
MD5
902723a8b1bb34619fcb676d6a7e7156
-
SHA1
b85c2021e7f3f3f0875bbeb7fb70f1f0bb23c0a0
-
SHA256
9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee
-
SHA512
a410aeeb7f8a3b96dcedc5980e4d38195cfe0fad38fa4bf62d4020caa9f66df7e61c0798887547c55ecb32d049fdc30337bccaa14a4c4cfd7361f690a3969f81
-
SSDEEP
6144:KBy+bnr+yp0yN90QESBe2p32vxv2PHZCuj/U9FTOMaeDuGDMQM2c8HXFtSo5z9WO:rMrOy90cpGvkHBDcFTW4uRQw8z5ZWSV
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1