General
-
Target
acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b
-
Size
725KB
-
Sample
241109-z9e29a1qhx
-
MD5
8e18b42cb41c060dbe2af686a23f2e85
-
SHA1
32592753f8a7ab96256bc22994cfc801db5e5183
-
SHA256
acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b
-
SHA512
87ac36a1abcfbebc34653590307ab0f979afcd6427b1882a661e1ce5a407617bb8d6e50f3153ffa00d4e7dd9785576a49c5bda2335bc69d96aaf883587f467c0
-
SSDEEP
12288:bMr8y90DhJ5Ofrxp9AGS1h0du6b2btdC9khPsF74TFByqrU1n1uaB2ToD30pJ:ryyufrVqh0CbDOF8TJrK1u4t3sJ
Static task
static1
Behavioral task
behavioral1
Sample
acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b
-
Size
725KB
-
MD5
8e18b42cb41c060dbe2af686a23f2e85
-
SHA1
32592753f8a7ab96256bc22994cfc801db5e5183
-
SHA256
acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b
-
SHA512
87ac36a1abcfbebc34653590307ab0f979afcd6427b1882a661e1ce5a407617bb8d6e50f3153ffa00d4e7dd9785576a49c5bda2335bc69d96aaf883587f467c0
-
SSDEEP
12288:bMr8y90DhJ5Ofrxp9AGS1h0du6b2btdC9khPsF74TFByqrU1n1uaB2ToD30pJ:ryyufrVqh0CbDOF8TJrK1u4t3sJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1