General
-
Target
08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402
-
Size
484KB
-
Sample
241108-yk1rzsyejl
-
MD5
e2dd34157ed0dba3f1be7f82bc10336b
-
SHA1
7eaa6e588e00c21b7eccb8f2bd96bf7d8da66bab
-
SHA256
08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402
-
SHA512
be468243b6fd949b3f2d4baa5f4e21793405c0a43c0ffa0bc806d6ec798d08e2ead7155d8c15e7abab28faf9a465efa5874da322b29192037ac72523e37d1955
-
SSDEEP
12288:qMrZy90n2Ot0VDdBlKfGKC6P5uBypICkT9SeF:fyQOVBBMfGn6R/pIr
Static task
static1
Behavioral task
behavioral1
Sample
08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402
-
Size
484KB
-
MD5
e2dd34157ed0dba3f1be7f82bc10336b
-
SHA1
7eaa6e588e00c21b7eccb8f2bd96bf7d8da66bab
-
SHA256
08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402
-
SHA512
be468243b6fd949b3f2d4baa5f4e21793405c0a43c0ffa0bc806d6ec798d08e2ead7155d8c15e7abab28faf9a465efa5874da322b29192037ac72523e37d1955
-
SSDEEP
12288:qMrZy90n2Ot0VDdBlKfGKC6P5uBypICkT9SeF:fyQOVBBMfGn6R/pIr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1