General
-
Target
6d70eb078d421f11b795389c71a8a7b81ae29470ccd5de55eb6d6cea39253f90
-
Size
483KB
-
Sample
241108-txzm8sxqdm
-
MD5
1aee5795c12564f1b3d8a28ad9e7601c
-
SHA1
bc7403a4c03921491b56d9e486c63b6d15839b20
-
SHA256
6d70eb078d421f11b795389c71a8a7b81ae29470ccd5de55eb6d6cea39253f90
-
SHA512
b8ea766328957971df2f99d9b7da350bd372111fee4d915f35e3d87492255e0e732be749f161a8bf127257fedfb392d74f1e4f0876e39520087e83038e6b2b53
-
SSDEEP
12288:lMr7y90/4GmiGVknNJtlvUmEsKtd/+C9RSdDHPEjJeYl:uyVGEVEjtxFtKtA9NYdl
Static task
static1
Behavioral task
behavioral1
Sample
6d70eb078d421f11b795389c71a8a7b81ae29470ccd5de55eb6d6cea39253f90.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
6d70eb078d421f11b795389c71a8a7b81ae29470ccd5de55eb6d6cea39253f90
-
Size
483KB
-
MD5
1aee5795c12564f1b3d8a28ad9e7601c
-
SHA1
bc7403a4c03921491b56d9e486c63b6d15839b20
-
SHA256
6d70eb078d421f11b795389c71a8a7b81ae29470ccd5de55eb6d6cea39253f90
-
SHA512
b8ea766328957971df2f99d9b7da350bd372111fee4d915f35e3d87492255e0e732be749f161a8bf127257fedfb392d74f1e4f0876e39520087e83038e6b2b53
-
SSDEEP
12288:lMr7y90/4GmiGVknNJtlvUmEsKtd/+C9RSdDHPEjJeYl:uyVGEVEjtxFtKtA9NYdl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1