General
-
Target
ae868dd2bf31a1a843d0a99de1be88b73e20f78781859ce35ad0479bd9540ae4
-
Size
821KB
-
Sample
241110-1kxfnswaqq
-
MD5
210df40911dbb3ae74938ed4e1add534
-
SHA1
4134cdcfcd1ab29e3cf5db71bcaeeb1e55ddf832
-
SHA256
ae868dd2bf31a1a843d0a99de1be88b73e20f78781859ce35ad0479bd9540ae4
-
SHA512
321c276a225aa67bad249309ef199513de823d248ebca0283aaeafb7ef16c16278e7b05c30fb4d2387ed3236289eb7bc20336ec49351c9e0542900e0b66090f2
-
SSDEEP
24576:xyeEbVV9xWDNr6bDgny6ogpIZUVQ2Rr67TXQbp:keEbf9xgYbDgny6CZ4Q2RGTXQb
Static task
static1
Behavioral task
behavioral1
Sample
ae868dd2bf31a1a843d0a99de1be88b73e20f78781859ce35ad0479bd9540ae4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
ae868dd2bf31a1a843d0a99de1be88b73e20f78781859ce35ad0479bd9540ae4
-
Size
821KB
-
MD5
210df40911dbb3ae74938ed4e1add534
-
SHA1
4134cdcfcd1ab29e3cf5db71bcaeeb1e55ddf832
-
SHA256
ae868dd2bf31a1a843d0a99de1be88b73e20f78781859ce35ad0479bd9540ae4
-
SHA512
321c276a225aa67bad249309ef199513de823d248ebca0283aaeafb7ef16c16278e7b05c30fb4d2387ed3236289eb7bc20336ec49351c9e0542900e0b66090f2
-
SSDEEP
24576:xyeEbVV9xWDNr6bDgny6ogpIZUVQ2Rr67TXQbp:keEbf9xgYbDgny6CZ4Q2RGTXQb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1