General
-
Target
bf5672ecce0f24b20e0b1830cdde45e197e01a5560993a126a57f100bed096b8
-
Size
481KB
-
Sample
241108-nrp9qatphk
-
MD5
ab69c78a479818e9b5140f3fa2d95c08
-
SHA1
d7043b104cbfd8b229ac53529d2c8aebf1690f82
-
SHA256
bf5672ecce0f24b20e0b1830cdde45e197e01a5560993a126a57f100bed096b8
-
SHA512
af8260d1e90a335bf44ae6228bd9d51111b4ef99050742a6dd7ce6cdf9db9bf5197a7a3791d7b3ee11b6f638ca3d317847cbbb8bf9a81f52a01a27a9d3cec723
-
SSDEEP
12288:9Mrdy90cawOfOnVTHKjGiG7yFT3yj6FUv4I9fJr:EyluWVzhz7y8Ffl
Static task
static1
Behavioral task
behavioral1
Sample
bf5672ecce0f24b20e0b1830cdde45e197e01a5560993a126a57f100bed096b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
bf5672ecce0f24b20e0b1830cdde45e197e01a5560993a126a57f100bed096b8
-
Size
481KB
-
MD5
ab69c78a479818e9b5140f3fa2d95c08
-
SHA1
d7043b104cbfd8b229ac53529d2c8aebf1690f82
-
SHA256
bf5672ecce0f24b20e0b1830cdde45e197e01a5560993a126a57f100bed096b8
-
SHA512
af8260d1e90a335bf44ae6228bd9d51111b4ef99050742a6dd7ce6cdf9db9bf5197a7a3791d7b3ee11b6f638ca3d317847cbbb8bf9a81f52a01a27a9d3cec723
-
SSDEEP
12288:9Mrdy90cawOfOnVTHKjGiG7yFT3yj6FUv4I9fJr:EyluWVzhz7y8Ffl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1