General
-
Target
c8afe10c116784f5ce46cb13c5a49a9942f8daec10730d0d8d8d12b921e8f5e3
-
Size
560KB
-
Sample
241110-1hgx7swakm
-
MD5
634e990ce682c402d551aa3d6d7e2ed5
-
SHA1
f2c54de96189f825f933ce3915ff2d097463da3d
-
SHA256
c8afe10c116784f5ce46cb13c5a49a9942f8daec10730d0d8d8d12b921e8f5e3
-
SHA512
bc46bbaa8b669abd194e7f6dcf386486ebfdb8b0ecf44816431dc6f026fb55ee78cc46d5f4d6bb3409428c8de096d38a68ca67760c57e0f7d47a648b9577ea65
-
SSDEEP
12288:zMrIy902mvVbt9LcRYXW+vq5d8dKzC2UJsffO:PyUvVbnQYGOS8dKzrwofO
Static task
static1
Behavioral task
behavioral1
Sample
c8afe10c116784f5ce46cb13c5a49a9942f8daec10730d0d8d8d12b921e8f5e3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
c8afe10c116784f5ce46cb13c5a49a9942f8daec10730d0d8d8d12b921e8f5e3
-
Size
560KB
-
MD5
634e990ce682c402d551aa3d6d7e2ed5
-
SHA1
f2c54de96189f825f933ce3915ff2d097463da3d
-
SHA256
c8afe10c116784f5ce46cb13c5a49a9942f8daec10730d0d8d8d12b921e8f5e3
-
SHA512
bc46bbaa8b669abd194e7f6dcf386486ebfdb8b0ecf44816431dc6f026fb55ee78cc46d5f4d6bb3409428c8de096d38a68ca67760c57e0f7d47a648b9577ea65
-
SSDEEP
12288:zMrIy902mvVbt9LcRYXW+vq5d8dKzC2UJsffO:PyUvVbnQYGOS8dKzrwofO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1