General
-
Target
4c5e5a1d98da843a445b953292f040c7801c54f7bc8a9456041ccc4b1b8d0685
-
Size
483KB
-
Sample
241109-b4mcdavbpq
-
MD5
670ebd0a9be52156b4d578cff43dd0b8
-
SHA1
f0b58ba5ac193798bdd5a5f0b3d78a81bffc5cd0
-
SHA256
4c5e5a1d98da843a445b953292f040c7801c54f7bc8a9456041ccc4b1b8d0685
-
SHA512
75156f6e41fb75afc90e5992cd52e6ce30c6b7618832e83ea87a0bcf15fba12426b9d7d2077d6f09516e4d9fd827ba2a5aef90cc144e34067fe70761a4114b2b
-
SSDEEP
12288:nMr1y901iBea/5+YESM2UmEsKtdK+d9RSdDHPE3b/0UM:qy9Qg55nlFtKt7MNscP
Static task
static1
Behavioral task
behavioral1
Sample
4c5e5a1d98da843a445b953292f040c7801c54f7bc8a9456041ccc4b1b8d0685.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
4c5e5a1d98da843a445b953292f040c7801c54f7bc8a9456041ccc4b1b8d0685
-
Size
483KB
-
MD5
670ebd0a9be52156b4d578cff43dd0b8
-
SHA1
f0b58ba5ac193798bdd5a5f0b3d78a81bffc5cd0
-
SHA256
4c5e5a1d98da843a445b953292f040c7801c54f7bc8a9456041ccc4b1b8d0685
-
SHA512
75156f6e41fb75afc90e5992cd52e6ce30c6b7618832e83ea87a0bcf15fba12426b9d7d2077d6f09516e4d9fd827ba2a5aef90cc144e34067fe70761a4114b2b
-
SSDEEP
12288:nMr1y901iBea/5+YESM2UmEsKtdK+d9RSdDHPE3b/0UM:qy9Qg55nlFtKt7MNscP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1