General
-
Target
28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7
-
Size
484KB
-
Sample
241108-yp3r5syeql
-
MD5
a03c4dcd4acc57491cedbb447fda3c82
-
SHA1
8622dfdd6cb46ef2a3d6af4f591c24e852159683
-
SHA256
28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7
-
SHA512
5363afc31faae2b375386643c3ced2e25c5f178453155ae9fffe1d55c0638663cda675acbada8c4efc8272264f767682a164d9856fe5410ece90ae115ae498de
-
SSDEEP
12288:6MrXy90KXhMWaqlftD5glRDDUJ12xjie/GW1rIy5TH:ZyZ+qf5g7UJExjvFL5TH
Static task
static1
Behavioral task
behavioral1
Sample
28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7
-
Size
484KB
-
MD5
a03c4dcd4acc57491cedbb447fda3c82
-
SHA1
8622dfdd6cb46ef2a3d6af4f591c24e852159683
-
SHA256
28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7
-
SHA512
5363afc31faae2b375386643c3ced2e25c5f178453155ae9fffe1d55c0638663cda675acbada8c4efc8272264f767682a164d9856fe5410ece90ae115ae498de
-
SSDEEP
12288:6MrXy90KXhMWaqlftD5glRDDUJ12xjie/GW1rIy5TH:ZyZ+qf5g7UJExjvFL5TH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1