General
-
Target
4168d3302abcb14ebe8f20f6c29d1e1b294ab2a1e2a3001d7b4fdcc9679fb474
-
Size
484KB
-
Sample
241108-neex8atnej
-
MD5
5c8f55135775c0b26bed5a9855efc399
-
SHA1
21f886028d77e4ae77d9ac96e86f4abab4185a49
-
SHA256
4168d3302abcb14ebe8f20f6c29d1e1b294ab2a1e2a3001d7b4fdcc9679fb474
-
SHA512
cefebdd2d13edb7d0aaac89e7c4ebef329afacf30f9287837e0f0117e811e936876ea8c1cac5d929582e545a60070fb55684ddba8c68a7bc9f814a6baa4030d6
-
SSDEEP
12288:VMrAy90kD7IvELvIV+SL028gd4wsjY3zXO/R:hyJIqNSLcu4u3q5
Static task
static1
Behavioral task
behavioral1
Sample
4168d3302abcb14ebe8f20f6c29d1e1b294ab2a1e2a3001d7b4fdcc9679fb474.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
4168d3302abcb14ebe8f20f6c29d1e1b294ab2a1e2a3001d7b4fdcc9679fb474
-
Size
484KB
-
MD5
5c8f55135775c0b26bed5a9855efc399
-
SHA1
21f886028d77e4ae77d9ac96e86f4abab4185a49
-
SHA256
4168d3302abcb14ebe8f20f6c29d1e1b294ab2a1e2a3001d7b4fdcc9679fb474
-
SHA512
cefebdd2d13edb7d0aaac89e7c4ebef329afacf30f9287837e0f0117e811e936876ea8c1cac5d929582e545a60070fb55684ddba8c68a7bc9f814a6baa4030d6
-
SSDEEP
12288:VMrAy90kD7IvELvIV+SL028gd4wsjY3zXO/R:hyJIqNSLcu4u3q5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1