General
-
Target
022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02
-
Size
481KB
-
Sample
241109-vc2sja1lfr
-
MD5
9d0cb0fc533d126b70e64244c76a55b3
-
SHA1
af5c81cf35f24271750ab7e56fdb6f5e4ae39df2
-
SHA256
022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02
-
SHA512
d0902be646c57ca5b60a660fc9484e0da9aec5c125ea0b587eab5bd2f37d44d8190a693d58f40b2fdb523a8b446deda4205cdad3789c5bd4cb5aa304ca03a3ab
-
SSDEEP
12288:NMrRy90gOIYEV1o5M+rPaCSNjSNO4sJBZJA:sykIJVKq+zSNe0JA
Static task
static1
Behavioral task
behavioral1
Sample
022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02
-
Size
481KB
-
MD5
9d0cb0fc533d126b70e64244c76a55b3
-
SHA1
af5c81cf35f24271750ab7e56fdb6f5e4ae39df2
-
SHA256
022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02
-
SHA512
d0902be646c57ca5b60a660fc9484e0da9aec5c125ea0b587eab5bd2f37d44d8190a693d58f40b2fdb523a8b446deda4205cdad3789c5bd4cb5aa304ca03a3ab
-
SSDEEP
12288:NMrRy90gOIYEV1o5M+rPaCSNjSNO4sJBZJA:sykIJVKq+zSNe0JA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1