General
-
Target
9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a
-
Size
470KB
-
Sample
241108-q2n6hstcpq
-
MD5
99301c3ff246ad836f31a4ec102ad972
-
SHA1
20269e57b2105ea4ea3db648897885325fd65bcb
-
SHA256
9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a
-
SHA512
007c1e500b26c8d87fcca541ce7cfc3cec89752b7f40d7c92614886d555f6f8006fb30ca8daa9e5305f8fcc65ce29e196a313e86f7fd0c4691efe4178d254749
-
SSDEEP
12288:jMrly90CvQXDrV1h5kehkbXZgczPJOEZzMV:GyBoXXV1rke+J/hOYu
Static task
static1
Behavioral task
behavioral1
Sample
9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a
-
Size
470KB
-
MD5
99301c3ff246ad836f31a4ec102ad972
-
SHA1
20269e57b2105ea4ea3db648897885325fd65bcb
-
SHA256
9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a
-
SHA512
007c1e500b26c8d87fcca541ce7cfc3cec89752b7f40d7c92614886d555f6f8006fb30ca8daa9e5305f8fcc65ce29e196a313e86f7fd0c4691efe4178d254749
-
SSDEEP
12288:jMrly90CvQXDrV1h5kehkbXZgczPJOEZzMV:GyBoXXV1rke+J/hOYu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1