General
-
Target
742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a
-
Size
471KB
-
Sample
241109-zb3qna1kb1
-
MD5
c95057413810ad173806ad62e6848ca0
-
SHA1
e7272b1b2957051280699e4c82080220be780262
-
SHA256
742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a
-
SHA512
51e081c17534f0e959cd9dd4a6934701b5e3c91bac61888db3a2864bd2dd40b540f454af0bf0a4ffd2c871e32a0f2adaeb80525c1c3d45808cb6feec802ec2cb
-
SSDEEP
12288:JMrXy90Peof2BPRA3oZdHlD9AXxITzdDdVWa:myVof2o3ojHlRe6Thh
Static task
static1
Behavioral task
behavioral1
Sample
742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a
-
Size
471KB
-
MD5
c95057413810ad173806ad62e6848ca0
-
SHA1
e7272b1b2957051280699e4c82080220be780262
-
SHA256
742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a
-
SHA512
51e081c17534f0e959cd9dd4a6934701b5e3c91bac61888db3a2864bd2dd40b540f454af0bf0a4ffd2c871e32a0f2adaeb80525c1c3d45808cb6feec802ec2cb
-
SSDEEP
12288:JMrXy90Peof2BPRA3oZdHlD9AXxITzdDdVWa:myVof2o3ojHlRe6Thh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1