General
-
Target
308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe
-
Size
726KB
-
Sample
241109-hsgfbazepn
-
MD5
b9fe6147dc7a518d052a474097ceadbd
-
SHA1
824d031ffa99a4b2eb15b6a5f665e92e43af3ec2
-
SHA256
308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe
-
SHA512
dd644217400eb34076f3244959248733dacf8e30370cb59b3688b0c2588000865205de6b91e86171b687ea18775ec98d8eaf7aba4ad567ae1ee8dd37f682b150
-
SSDEEP
12288:KMr0y90OVtd0BcHwYYx1vNNdNZRAa3DyZ/snuBB7rzyQblB5ArRXBrNgkRJ:iyd70Bc6x1lZZa/5BBry8XulBrNrb
Static task
static1
Behavioral task
behavioral1
Sample
308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe
-
Size
726KB
-
MD5
b9fe6147dc7a518d052a474097ceadbd
-
SHA1
824d031ffa99a4b2eb15b6a5f665e92e43af3ec2
-
SHA256
308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe
-
SHA512
dd644217400eb34076f3244959248733dacf8e30370cb59b3688b0c2588000865205de6b91e86171b687ea18775ec98d8eaf7aba4ad567ae1ee8dd37f682b150
-
SSDEEP
12288:KMr0y90OVtd0BcHwYYx1vNNdNZRAa3DyZ/snuBB7rzyQblB5ArRXBrNgkRJ:iyd70Bc6x1lZZa/5BBry8XulBrNrb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1