General
-
Target
2bd6ee7f1774edb6e267ac9ccb5fc04d513c316114c797247b82e70eb684d4d9
-
Size
530KB
-
Sample
241110-1gmgasvng1
-
MD5
6f9173ac808596fa8457e118aca71507
-
SHA1
f790cb025ad3a43efa1f61e1cffd55f4379d11db
-
SHA256
2bd6ee7f1774edb6e267ac9ccb5fc04d513c316114c797247b82e70eb684d4d9
-
SHA512
4dfc3d80f78404bc5244a46e144d3b82b0e34c6dd412fcda18c393557cabf6085dec734f52f32c813dde0000b67b208331771e052e01db7c4d38545e932e9d74
-
SSDEEP
12288:rMrLy90+h367KITikQrexWuY6YXvhFZuyXQDhh02+SBa:syv3HkbLY6YXvhhXQDhHU
Static task
static1
Behavioral task
behavioral1
Sample
2bd6ee7f1774edb6e267ac9ccb5fc04d513c316114c797247b82e70eb684d4d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
2bd6ee7f1774edb6e267ac9ccb5fc04d513c316114c797247b82e70eb684d4d9
-
Size
530KB
-
MD5
6f9173ac808596fa8457e118aca71507
-
SHA1
f790cb025ad3a43efa1f61e1cffd55f4379d11db
-
SHA256
2bd6ee7f1774edb6e267ac9ccb5fc04d513c316114c797247b82e70eb684d4d9
-
SHA512
4dfc3d80f78404bc5244a46e144d3b82b0e34c6dd412fcda18c393557cabf6085dec734f52f32c813dde0000b67b208331771e052e01db7c4d38545e932e9d74
-
SSDEEP
12288:rMrLy90+h367KITikQrexWuY6YXvhFZuyXQDhh02+SBa:syv3HkbLY6YXvhhXQDhHU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1