General
-
Target
4d56cbe483b6894cdab9eb5c8d840853af1b1bbc95153ef5ee3baaec5bd6f312
-
Size
855KB
-
Sample
241110-1wed8swgmf
-
MD5
e0e044e6d646ef9707c95ecd72dbf66b
-
SHA1
1763dac469193cdea76e1a830f183a44aa69af55
-
SHA256
4d56cbe483b6894cdab9eb5c8d840853af1b1bbc95153ef5ee3baaec5bd6f312
-
SHA512
53068a777cc236a42e706817fcb94d13aff97e3251488896f2d964fe437f12c25ff96e2b21350fddecd1a41ec3528ab39fc936af958c5681ab56797e675aa79b
-
SSDEEP
24576:5yCjXw7kguZOFNgnnszKss9Uaz1uedz9c3lo:sCjXU+GSnnszKl93Ne1
Static task
static1
Behavioral task
behavioral1
Sample
4d56cbe483b6894cdab9eb5c8d840853af1b1bbc95153ef5ee3baaec5bd6f312.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
4d56cbe483b6894cdab9eb5c8d840853af1b1bbc95153ef5ee3baaec5bd6f312
-
Size
855KB
-
MD5
e0e044e6d646ef9707c95ecd72dbf66b
-
SHA1
1763dac469193cdea76e1a830f183a44aa69af55
-
SHA256
4d56cbe483b6894cdab9eb5c8d840853af1b1bbc95153ef5ee3baaec5bd6f312
-
SHA512
53068a777cc236a42e706817fcb94d13aff97e3251488896f2d964fe437f12c25ff96e2b21350fddecd1a41ec3528ab39fc936af958c5681ab56797e675aa79b
-
SSDEEP
24576:5yCjXw7kguZOFNgnnszKss9Uaz1uedz9c3lo:sCjXU+GSnnszKl93Ne1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1