General
-
Target
fa6096ff98d50d08f2f77b873c6e392afd41596c22dcc76fce5dda968df82c29N
-
Size
705KB
-
Sample
241110-3gsdnazrbk
-
MD5
6d7b2fed2c2fb94613beb6ede5b2d940
-
SHA1
c21a8e8491d44cc9d890295683c0db9c36796604
-
SHA256
fa6096ff98d50d08f2f77b873c6e392afd41596c22dcc76fce5dda968df82c29
-
SHA512
275eb6f347b33590001c915abdce575443fd116f2c3c48c71702f5a922210bafaeecec0136ee77ed6e7ca89bdc2f10165180c6eb2188aacbc6648f9c3d8f4cb8
-
SSDEEP
12288:IMrKy901IrNiqfX+D0QfYumGiDBB65izmCmzHTnPkJp3:SylNiqWQQfxmGiWLCmzHzU3
Static task
static1
Behavioral task
behavioral1
Sample
fa6096ff98d50d08f2f77b873c6e392afd41596c22dcc76fce5dda968df82c29N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Targets
-
-
Target
fa6096ff98d50d08f2f77b873c6e392afd41596c22dcc76fce5dda968df82c29N
-
Size
705KB
-
MD5
6d7b2fed2c2fb94613beb6ede5b2d940
-
SHA1
c21a8e8491d44cc9d890295683c0db9c36796604
-
SHA256
fa6096ff98d50d08f2f77b873c6e392afd41596c22dcc76fce5dda968df82c29
-
SHA512
275eb6f347b33590001c915abdce575443fd116f2c3c48c71702f5a922210bafaeecec0136ee77ed6e7ca89bdc2f10165180c6eb2188aacbc6648f9c3d8f4cb8
-
SSDEEP
12288:IMrKy901IrNiqfX+D0QfYumGiDBB65izmCmzHTnPkJp3:SylNiqWQQfxmGiWLCmzHzU3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1