General
-
Target
ab688c561b90deff20fc7943fbe374f93b21b62d62355e1f9fec66e47a7cebf4
-
Size
482KB
-
Sample
241109-wsgmzazaqd
-
MD5
79e6b3d456d297001bf4d0e27d160709
-
SHA1
f0cdb8647bddff3cd8df1720c128fba587bc52f6
-
SHA256
ab688c561b90deff20fc7943fbe374f93b21b62d62355e1f9fec66e47a7cebf4
-
SHA512
2114c86f6d65b02fe1b0d1fc72de02ba664f1d2d792cca1b9fbe00ec555b9d9deda7156a51a6c3c6697f7a2e38787aec7f8268ea83e56704a2cfab2baa74637a
-
SSDEEP
12288:gMrry9038Xq0W9egXKyEIZUwTruKUTiaj:byj60GDxUmuKUb
Static task
static1
Behavioral task
behavioral1
Sample
ab688c561b90deff20fc7943fbe374f93b21b62d62355e1f9fec66e47a7cebf4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
ab688c561b90deff20fc7943fbe374f93b21b62d62355e1f9fec66e47a7cebf4
-
Size
482KB
-
MD5
79e6b3d456d297001bf4d0e27d160709
-
SHA1
f0cdb8647bddff3cd8df1720c128fba587bc52f6
-
SHA256
ab688c561b90deff20fc7943fbe374f93b21b62d62355e1f9fec66e47a7cebf4
-
SHA512
2114c86f6d65b02fe1b0d1fc72de02ba664f1d2d792cca1b9fbe00ec555b9d9deda7156a51a6c3c6697f7a2e38787aec7f8268ea83e56704a2cfab2baa74637a
-
SSDEEP
12288:gMrry9038Xq0W9egXKyEIZUwTruKUTiaj:byj60GDxUmuKUb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1