General
-
Target
1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996
-
Size
471KB
-
Sample
241109-v3jdwaxqcy
-
MD5
979198bef60d4e4ff211eb73f2d4d23b
-
SHA1
2336b6337d8a7205983af37fbfea0264935910cc
-
SHA256
1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996
-
SHA512
3d2a4ced5f3c5f02a8b25a1681467a2f9706dd2819b5d4d5828bf7e6c7b8268b184212c49310b5ea1f8cf68a845fc2f2299bbcbf5ed67d625eb1734b9814c451
-
SSDEEP
12288:2Mrty90eLCjGSkvP+UDhtweSI8XHE3t+dUjcpSw:byWkvmShtweSIyfCcf
Static task
static1
Behavioral task
behavioral1
Sample
1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996
-
Size
471KB
-
MD5
979198bef60d4e4ff211eb73f2d4d23b
-
SHA1
2336b6337d8a7205983af37fbfea0264935910cc
-
SHA256
1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996
-
SHA512
3d2a4ced5f3c5f02a8b25a1681467a2f9706dd2819b5d4d5828bf7e6c7b8268b184212c49310b5ea1f8cf68a845fc2f2299bbcbf5ed67d625eb1734b9814c451
-
SSDEEP
12288:2Mrty90eLCjGSkvP+UDhtweSI8XHE3t+dUjcpSw:byWkvmShtweSIyfCcf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1