General
-
Target
636d7ab855bf41569b5387288e016c56a2786a8e22658798a2a98edcb084ea78
-
Size
499KB
-
Sample
241110-1jnr5sypak
-
MD5
3b953a2b4dfcd8bc455df01cea0bbc0c
-
SHA1
809d4e455bb78cc6493d85fd514a3fd81a6699cf
-
SHA256
636d7ab855bf41569b5387288e016c56a2786a8e22658798a2a98edcb084ea78
-
SHA512
4ac2d428abf69db85c156d7b179ef56278869714598939ec34a7d253dd1045b5c38abbd214247c552ebb8def53cecab820e3bb8e831140a95e08754ab874d3b8
-
SSDEEP
12288:+kl/kreB5DqZMij7ae+lSF/gujMWJlZczDaSmds4gKhMKSOhG5:+MB5uZMi//gSlg4MSZczDaLJuKHM
Static task
static1
Behavioral task
behavioral1
Sample
997c73cd1e75587de8ddbdbabc4527454f80eb06515efe6f5d8d0bae39e0dfa0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
997c73cd1e75587de8ddbdbabc4527454f80eb06515efe6f5d8d0bae39e0dfa0.exe
-
Size
550KB
-
MD5
ea554d350e4c10fc818e5318067b1972
-
SHA1
e6d958b493a587240c7ab65c60a0e3e743d9b0f1
-
SHA256
997c73cd1e75587de8ddbdbabc4527454f80eb06515efe6f5d8d0bae39e0dfa0
-
SHA512
df24f3a1df125f8f35cf435ca1142c5d3291ec2c5f5f24af87adf25b2251d3c17d1f1b13f3acf77547e9fb112e03121fd858bf9603ebd767ecd430e8c57dfe83
-
SSDEEP
12288:nMrDy90O3DJfmJxj5kA5n/Fnm8Dyzxi1CPumsM2YveZgs0t:QyV1OJxjH5n9DWxNPumsMFeZ5S
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1