General
-
Target
a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f
-
Size
723KB
-
Sample
241109-fyhjfsxpbx
-
MD5
c6cb4a7b160762231e61848ddccafc1d
-
SHA1
1961116c001fd6736664d5bca39023c2e56449b9
-
SHA256
a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f
-
SHA512
079c784a134a2f1fbe3db09ecd8778d6726d2a3e1899caa8e464226228fb1fd8044b907295685f2207d5c4d14663d0eb737a2af733bbad4f17a09be6c5cfa0fa
-
SSDEEP
12288:FMrvy90Rb+J5oAJgXk5UTgNWHYCZl3KXV7njTEYA5UY0UWkBFx56Rzg/J2MB2i:WyObm5Nb5ULqXVzjTEYAYRtc/sMBx
Static task
static1
Behavioral task
behavioral1
Sample
a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f
-
Size
723KB
-
MD5
c6cb4a7b160762231e61848ddccafc1d
-
SHA1
1961116c001fd6736664d5bca39023c2e56449b9
-
SHA256
a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f
-
SHA512
079c784a134a2f1fbe3db09ecd8778d6726d2a3e1899caa8e464226228fb1fd8044b907295685f2207d5c4d14663d0eb737a2af733bbad4f17a09be6c5cfa0fa
-
SSDEEP
12288:FMrvy90Rb+J5oAJgXk5UTgNWHYCZl3KXV7njTEYA5UY0UWkBFx56Rzg/J2MB2i:WyObm5Nb5ULqXVzjTEYAYRtc/sMBx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1