General
-
Target
f61602a6c53c746bdd673fcc6bad93e95703d8f241c53b5c67a316783d509f56
-
Size
482KB
-
Sample
241108-ztj19szdnl
-
MD5
588200de1d0aeb47af1da66dbe9f16cd
-
SHA1
87efbb76c5afc0ab29c260dfca2a6ed96405aa8c
-
SHA256
f61602a6c53c746bdd673fcc6bad93e95703d8f241c53b5c67a316783d509f56
-
SHA512
fec35e6addc3b94655b71d3a86b39e3c9b8f7b4c57b10f17661112e26b461383b1fb22725e193d161e92504b4a1650ad0a1b29dcdbd91c8bcf610c7a87036d58
-
SSDEEP
12288:qMryy90QX3rsCOBrrqjVJ9oHHXQPDkjzdemDat:0yrOhrw2HXQPDoIiU
Static task
static1
Behavioral task
behavioral1
Sample
f61602a6c53c746bdd673fcc6bad93e95703d8f241c53b5c67a316783d509f56.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
f61602a6c53c746bdd673fcc6bad93e95703d8f241c53b5c67a316783d509f56
-
Size
482KB
-
MD5
588200de1d0aeb47af1da66dbe9f16cd
-
SHA1
87efbb76c5afc0ab29c260dfca2a6ed96405aa8c
-
SHA256
f61602a6c53c746bdd673fcc6bad93e95703d8f241c53b5c67a316783d509f56
-
SHA512
fec35e6addc3b94655b71d3a86b39e3c9b8f7b4c57b10f17661112e26b461383b1fb22725e193d161e92504b4a1650ad0a1b29dcdbd91c8bcf610c7a87036d58
-
SSDEEP
12288:qMryy90QX3rsCOBrrqjVJ9oHHXQPDkjzdemDat:0yrOhrw2HXQPDoIiU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1