General
-
Target
65201c9cdfae57413d0ffea8e2c9a34ac4814e701401070b0a475235e5d2debc
-
Size
500KB
-
Sample
241108-z98pkayrgy
-
MD5
41fedd4a7167cfec9f5a9067de94622e
-
SHA1
874c336e1de016d662fff088d71bfb2179391dc3
-
SHA256
65201c9cdfae57413d0ffea8e2c9a34ac4814e701401070b0a475235e5d2debc
-
SHA512
94947a16c9d3097cbda4d4ae1d5dd33028642a52254cd01b7b6313146758d18bad00a73cb1df29599ec8bf6125843de018304c156b41e4155d4718e68c0cfdee
-
SSDEEP
6144:K8y+bnr++p0yN90QE0ThTs5N1GGQV2yXtRIwCXJpZvb6VnEbWYGimHpcdfhZfOBR:QMryy90uFSQ/Xtq11bW6P2BFVR
Static task
static1
Behavioral task
behavioral1
Sample
65201c9cdfae57413d0ffea8e2c9a34ac4814e701401070b0a475235e5d2debc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
65201c9cdfae57413d0ffea8e2c9a34ac4814e701401070b0a475235e5d2debc
-
Size
500KB
-
MD5
41fedd4a7167cfec9f5a9067de94622e
-
SHA1
874c336e1de016d662fff088d71bfb2179391dc3
-
SHA256
65201c9cdfae57413d0ffea8e2c9a34ac4814e701401070b0a475235e5d2debc
-
SHA512
94947a16c9d3097cbda4d4ae1d5dd33028642a52254cd01b7b6313146758d18bad00a73cb1df29599ec8bf6125843de018304c156b41e4155d4718e68c0cfdee
-
SSDEEP
6144:K8y+bnr++p0yN90QE0ThTs5N1GGQV2yXtRIwCXJpZvb6VnEbWYGimHpcdfhZfOBR:QMryy90uFSQ/Xtq11bW6P2BFVR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1