General
-
Target
d9c0b50152859d879f88f79479595465cea33b0dc7b68c71fc6eebf2bc5d996dN
-
Size
202KB
-
Sample
241110-3ettpswqg1
-
MD5
badade60e366f395b09b52daaf40f8f0
-
SHA1
f9c4967f7afaf8966a3d95fcc31311b60713ce06
-
SHA256
d9c0b50152859d879f88f79479595465cea33b0dc7b68c71fc6eebf2bc5d996d
-
SHA512
e8ccf80046fac21c555db51955074b343bf7696a99cf5c29a62dcb7c7863ab936a00e9071fa4d6b07facb611eb20dc8604b9f0839c20584b997dc48aabb18e07
-
SSDEEP
3072:K9y+bnr+O1v5GWp1icKAArDZz4N9GhbkrNEk6qYSSR2U2Um1qtlY1:K9y+bnr+wp0yN90QEb/I
Static task
static1
Behavioral task
behavioral1
Sample
d9c0b50152859d879f88f79479595465cea33b0dc7b68c71fc6eebf2bc5d996dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Targets
-
-
Target
d9c0b50152859d879f88f79479595465cea33b0dc7b68c71fc6eebf2bc5d996dN
-
Size
202KB
-
MD5
badade60e366f395b09b52daaf40f8f0
-
SHA1
f9c4967f7afaf8966a3d95fcc31311b60713ce06
-
SHA256
d9c0b50152859d879f88f79479595465cea33b0dc7b68c71fc6eebf2bc5d996d
-
SHA512
e8ccf80046fac21c555db51955074b343bf7696a99cf5c29a62dcb7c7863ab936a00e9071fa4d6b07facb611eb20dc8604b9f0839c20584b997dc48aabb18e07
-
SSDEEP
3072:K9y+bnr+O1v5GWp1icKAArDZz4N9GhbkrNEk6qYSSR2U2Um1qtlY1:K9y+bnr+wp0yN90QEb/I
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1