General
-
Target
0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254
-
Size
482KB
-
Sample
241108-r4z68sthmr
-
MD5
45494d55e9369121b009242e253cc999
-
SHA1
0606eb5b68a02df4e5345fa1a7aeaaaf06978b60
-
SHA256
0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254
-
SHA512
14f3e3ae8a07986e551021c8dd95a29119dc790625f459d2ee9750d78ee7b7944a7c87d757270ca1960990b3013f06d7b747d8083de3c1fe493ec2764d9589b2
-
SSDEEP
12288:KMr/y90hyEb99VNnYCZWFkwC3KyEIRUwTruK7Tium5V9:xyinbbVVYkwCj5UmuK7ub5H
Static task
static1
Behavioral task
behavioral1
Sample
0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254
-
Size
482KB
-
MD5
45494d55e9369121b009242e253cc999
-
SHA1
0606eb5b68a02df4e5345fa1a7aeaaaf06978b60
-
SHA256
0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254
-
SHA512
14f3e3ae8a07986e551021c8dd95a29119dc790625f459d2ee9750d78ee7b7944a7c87d757270ca1960990b3013f06d7b747d8083de3c1fe493ec2764d9589b2
-
SSDEEP
12288:KMr/y90hyEb99VNnYCZWFkwC3KyEIRUwTruK7Tium5V9:xyinbbVVYkwCj5UmuK7ub5H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1