General
-
Target
8a1b0f00a403c2beb8bf8e3c734c84760985964e3f104fb80cbfee726e560dfe
-
Size
478KB
-
Sample
241109-ab22pavqfr
-
MD5
e933bdd31a7f6ccdcad5be35f02bfd8e
-
SHA1
284f7281f66667238b4893567fb9cfc1d2109e73
-
SHA256
8a1b0f00a403c2beb8bf8e3c734c84760985964e3f104fb80cbfee726e560dfe
-
SHA512
56ce8c22b78a04a0c27c08ad823332b309b1d43c65042bd7fc6947d1529fd093499b7497dc8e3f94e68cbb3b1eac4ff00f4ec660cdaeb0518856df135050f6c2
-
SSDEEP
6144:KPy+bnr+jp0yN90QEgzzAhs5XJIEN+8wRrCMW4CG2UtYgudY4B63KRmUYt6ibBhj:xMrjy90aQEXJhetCbUjYiKRm1jdj/jF
Static task
static1
Behavioral task
behavioral1
Sample
8a1b0f00a403c2beb8bf8e3c734c84760985964e3f104fb80cbfee726e560dfe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
8a1b0f00a403c2beb8bf8e3c734c84760985964e3f104fb80cbfee726e560dfe
-
Size
478KB
-
MD5
e933bdd31a7f6ccdcad5be35f02bfd8e
-
SHA1
284f7281f66667238b4893567fb9cfc1d2109e73
-
SHA256
8a1b0f00a403c2beb8bf8e3c734c84760985964e3f104fb80cbfee726e560dfe
-
SHA512
56ce8c22b78a04a0c27c08ad823332b309b1d43c65042bd7fc6947d1529fd093499b7497dc8e3f94e68cbb3b1eac4ff00f4ec660cdaeb0518856df135050f6c2
-
SSDEEP
6144:KPy+bnr+jp0yN90QEgzzAhs5XJIEN+8wRrCMW4CG2UtYgudY4B63KRmUYt6ibBhj:xMrjy90aQEXJhetCbUjYiKRm1jdj/jF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1