General
-
Target
d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717
-
Size
483KB
-
Sample
241109-eqxgzawqay
-
MD5
9a2ca1c03c5901dbff0efcea7c625da7
-
SHA1
2461c2dbef22b7f4a7aa4e859fa7edcf0dd2bf95
-
SHA256
d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717
-
SHA512
351872219e79894ec89a171f998de425f0612dcfa8dc219e3a9f11819c917d9b682f47b6a7cbfa2aa3e4d99249646cec040f0be51c4f860458be2c939b41ee4b
-
SSDEEP
12288:gMroy90IrG6VYFlpnjmrQUc8puGuExT1ueVMZuzVsAsUjczSX:4yZtV4cQI6w1urZuztj2SX
Static task
static1
Behavioral task
behavioral1
Sample
d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717
-
Size
483KB
-
MD5
9a2ca1c03c5901dbff0efcea7c625da7
-
SHA1
2461c2dbef22b7f4a7aa4e859fa7edcf0dd2bf95
-
SHA256
d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717
-
SHA512
351872219e79894ec89a171f998de425f0612dcfa8dc219e3a9f11819c917d9b682f47b6a7cbfa2aa3e4d99249646cec040f0be51c4f860458be2c939b41ee4b
-
SSDEEP
12288:gMroy90IrG6VYFlpnjmrQUc8puGuExT1ueVMZuzVsAsUjczSX:4yZtV4cQI6w1urZuztj2SX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1