General
-
Target
ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd
-
Size
478KB
-
Sample
241109-x4pcmazhrc
-
MD5
fc231eb3e06720bd085c84b09be5683d
-
SHA1
a5577ba53c19b3b928dfdad02a963db3c40dd9cb
-
SHA256
ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd
-
SHA512
3c1076c9a52153d6d269fa6036ebb599d48fd7b3a17bbc70def544ca62a3ea70f03da8dbd2e96a122a15a6a330700d613cd92e19578f8ec0a614b0f08a42365a
-
SSDEEP
6144:Kwy+bnr+Np0yN90QEf4x9Aj0Ei6CieGSV/RhdhLkTUnN/Nq69:8Mrty90h4x9AoE0XGO/RhdhLk2NVr
Static task
static1
Behavioral task
behavioral1
Sample
ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd
-
Size
478KB
-
MD5
fc231eb3e06720bd085c84b09be5683d
-
SHA1
a5577ba53c19b3b928dfdad02a963db3c40dd9cb
-
SHA256
ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd
-
SHA512
3c1076c9a52153d6d269fa6036ebb599d48fd7b3a17bbc70def544ca62a3ea70f03da8dbd2e96a122a15a6a330700d613cd92e19578f8ec0a614b0f08a42365a
-
SSDEEP
6144:Kwy+bnr+Np0yN90QEf4x9Aj0Ei6CieGSV/RhdhLkTUnN/Nq69:8Mrty90h4x9AoE0XGO/RhdhLk2NVr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1