General
-
Target
f598b28ee296d220292f781eb018a838070e5d45b8f2f470c6ac2f941da53a2f
-
Size
483KB
-
Sample
241108-lwgr2azjex
-
MD5
08e83553295708bddb7ffc73b4e55d87
-
SHA1
963ebd10c352cfea512e8b945a9160e4486303e7
-
SHA256
f598b28ee296d220292f781eb018a838070e5d45b8f2f470c6ac2f941da53a2f
-
SHA512
a3f383c48e720fafcf6687f2cffff6a17387555b3d3e40c6f12304a59caa728892eabcbcd368477ed30a97edecf50d8d6a6b65a6bc9db6212c5eed32817a869e
-
SSDEEP
12288:gMrfy90z4beVPwrDpvTIlHHEoWwAUmEsKtd6+l9RSdDkPE4aLjD7Z:vy0DVPiZcHkokFtKtPkNocvl
Static task
static1
Behavioral task
behavioral1
Sample
f598b28ee296d220292f781eb018a838070e5d45b8f2f470c6ac2f941da53a2f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
f598b28ee296d220292f781eb018a838070e5d45b8f2f470c6ac2f941da53a2f
-
Size
483KB
-
MD5
08e83553295708bddb7ffc73b4e55d87
-
SHA1
963ebd10c352cfea512e8b945a9160e4486303e7
-
SHA256
f598b28ee296d220292f781eb018a838070e5d45b8f2f470c6ac2f941da53a2f
-
SHA512
a3f383c48e720fafcf6687f2cffff6a17387555b3d3e40c6f12304a59caa728892eabcbcd368477ed30a97edecf50d8d6a6b65a6bc9db6212c5eed32817a869e
-
SSDEEP
12288:gMrfy90z4beVPwrDpvTIlHHEoWwAUmEsKtd6+l9RSdDkPE4aLjD7Z:vy0DVPiZcHkokFtKtPkNocvl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1