General
-
Target
089b31c2dd81074580b8cc46c75b97bc23be1e2148b0069f79d7699e23785f32
-
Size
478KB
-
Sample
241109-q9n6gsvldy
-
MD5
b2d8db6a33722d4cba42fe1057f571f3
-
SHA1
fea558c889f6ed1026884548a7e340f5455051a1
-
SHA256
089b31c2dd81074580b8cc46c75b97bc23be1e2148b0069f79d7699e23785f32
-
SHA512
debb37760f24f8469e1f5822a1f851db44dd81c902b5ec1bd61a71eec41d5e40720d14a5542a47341a20797bd95fa423e1af2f332918ddd83060882b773b8489
-
SSDEEP
12288:RMrLy90pBHDjAGQLOUl74YWaeWZH+y2y8fLWYxe2xdTjr:iySBUOUSzHyOLWNm
Static task
static1
Behavioral task
behavioral1
Sample
089b31c2dd81074580b8cc46c75b97bc23be1e2148b0069f79d7699e23785f32.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
089b31c2dd81074580b8cc46c75b97bc23be1e2148b0069f79d7699e23785f32
-
Size
478KB
-
MD5
b2d8db6a33722d4cba42fe1057f571f3
-
SHA1
fea558c889f6ed1026884548a7e340f5455051a1
-
SHA256
089b31c2dd81074580b8cc46c75b97bc23be1e2148b0069f79d7699e23785f32
-
SHA512
debb37760f24f8469e1f5822a1f851db44dd81c902b5ec1bd61a71eec41d5e40720d14a5542a47341a20797bd95fa423e1af2f332918ddd83060882b773b8489
-
SSDEEP
12288:RMrLy90pBHDjAGQLOUl74YWaeWZH+y2y8fLWYxe2xdTjr:iySBUOUSzHyOLWNm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1