General
-
Target
76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841
-
Size
500KB
-
Sample
241109-gvffcszaja
-
MD5
f772c1f6f744198cd1b8777e41d7fa7d
-
SHA1
f9b22c9ced7153f2136c7a2ca4e5fd83e79671b3
-
SHA256
76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841
-
SHA512
b1fa8e9bf7663b19d2017513fa6910a4b7713797e42270747f4984f13a5e95baf2e0cf86abcad75b070f465fbc84a881d801cd6411cea1ab90ee5f5a381afee5
-
SSDEEP
12288:0Mr6y90nA0TaoYtomMdWhvKsNs9YEXHEA:+ylYAoDgCOEXHp
Static task
static1
Behavioral task
behavioral1
Sample
76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841
-
Size
500KB
-
MD5
f772c1f6f744198cd1b8777e41d7fa7d
-
SHA1
f9b22c9ced7153f2136c7a2ca4e5fd83e79671b3
-
SHA256
76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841
-
SHA512
b1fa8e9bf7663b19d2017513fa6910a4b7713797e42270747f4984f13a5e95baf2e0cf86abcad75b070f465fbc84a881d801cd6411cea1ab90ee5f5a381afee5
-
SSDEEP
12288:0Mr6y90nA0TaoYtomMdWhvKsNs9YEXHEA:+ylYAoDgCOEXHp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1