General
-
Target
d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9
-
Size
478KB
-
Sample
241108-plj17asdje
-
MD5
c5866f317d1039b18fcfdeaa8f5a7de7
-
SHA1
de24f463900e896ad376e05ac1db0a7691a47f9d
-
SHA256
d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9
-
SHA512
2a4099dbb46a5daead655b3fba66d3a6f555233b3e995ac46fc74e16f0a548bbbe91206787af3d24fc0637b66f4bc4e08ae38424d268c574fc194b475141d1cf
-
SSDEEP
12288:3Mruy90xIQU/BxjJ8ncrpVKcKZfQ9da4rQ:RyWIZBxjGnqpDKx0a4Q
Static task
static1
Behavioral task
behavioral1
Sample
d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9
-
Size
478KB
-
MD5
c5866f317d1039b18fcfdeaa8f5a7de7
-
SHA1
de24f463900e896ad376e05ac1db0a7691a47f9d
-
SHA256
d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9
-
SHA512
2a4099dbb46a5daead655b3fba66d3a6f555233b3e995ac46fc74e16f0a548bbbe91206787af3d24fc0637b66f4bc4e08ae38424d268c574fc194b475141d1cf
-
SSDEEP
12288:3Mruy90xIQU/BxjJ8ncrpVKcKZfQ9da4rQ:RyWIZBxjGnqpDKx0a4Q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1