General
-
Target
6ca88822b5ba6b634cfa1edc15a774cd8018bfc10a46b7982fec0f6dae1329eb
-
Size
426KB
-
Sample
241109-3qnf3avdlb
-
MD5
7545fe64d354d414e7e53bc19bbb7aca
-
SHA1
6b6e8454b6a1997157d4cc9ad892bc0ba9b1c71d
-
SHA256
6ca88822b5ba6b634cfa1edc15a774cd8018bfc10a46b7982fec0f6dae1329eb
-
SHA512
bf2d15694dcbe1f346c46c0e4e53a8549b107b9f31b532e2315c8b9e46b64e0c944e0019e79963341862454a9012c2ada81d07a5e6f0fa88649bcd72153e1b5d
-
SSDEEP
6144:R31JyN90nwWY55KNUm8aYM+ANj2SfEQ/jhcp98vHdztS/mvGbY4xsrcepRQAx:Rjy90FY55dHANCrQrhFJkY4xep6K
Static task
static1
Behavioral task
behavioral1
Sample
6098371c5a9482fceb415bbe4b4933a2451a07b26132c8e655fae8a4f7d9062a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
6098371c5a9482fceb415bbe4b4933a2451a07b26132c8e655fae8a4f7d9062a
-
Size
477KB
-
MD5
3dd7ba21f31240754e9d02b96625e5cd
-
SHA1
bd4a4c84d83bb306527a1781c2e7602b4b9102d3
-
SHA256
6098371c5a9482fceb415bbe4b4933a2451a07b26132c8e655fae8a4f7d9062a
-
SHA512
7d7900bdc8cdb202829fe26ae6a9abd9470c4d9cf41198858cb1cd5f114896dde05a42fc47c7987cf2b97efa9419d8a0fc26f08ce21be60b2d3085fb97dfeccd
-
SSDEEP
6144:KIy+bnr++p0yN90QE6Wm8aYM++Nj2SfEY/j5cp98THdztG/m9GRY4xsZcepRfi+6:EMrOy90JH+NCrYr5hJCY4x6pNs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1