General
-
Target
671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4
-
Size
500KB
-
Sample
241108-r11nlatjev
-
MD5
b35aac2302710b58e603a478c976a21f
-
SHA1
d3aeb8905432d1a5501d2cf658ea9697732bbb10
-
SHA256
671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4
-
SHA512
656ec607d2cfb008bd8ce7090d08d10379fe8fdb9999881702b86ff1cdf1834aee9663b6f1d9e9161e666dd25e22f3b9b42e6b5abd6f19bd8f3024b1edaba3ef
-
SSDEEP
12288:0MrAy90gwzXcGeMWbY7ezPp002W/TiFSgNxtj:cykLcUYY+GpW/QVNj
Static task
static1
Behavioral task
behavioral1
Sample
671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4
-
Size
500KB
-
MD5
b35aac2302710b58e603a478c976a21f
-
SHA1
d3aeb8905432d1a5501d2cf658ea9697732bbb10
-
SHA256
671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4
-
SHA512
656ec607d2cfb008bd8ce7090d08d10379fe8fdb9999881702b86ff1cdf1834aee9663b6f1d9e9161e666dd25e22f3b9b42e6b5abd6f19bd8f3024b1edaba3ef
-
SSDEEP
12288:0MrAy90gwzXcGeMWbY7ezPp002W/TiFSgNxtj:cykLcUYY+GpW/QVNj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1