General
-
Target
e12bc77e041facd56d5cd4cc2ff08483a0276a10e77f889243eaed0b6f4ada65
-
Size
726KB
-
Sample
241110-3jr6nsxdpj
-
MD5
172c8138b24f3fbca6ed2b0c3f0d1271
-
SHA1
841d73c0a24fac522e89f2d86272fe2f0e87ea73
-
SHA256
e12bc77e041facd56d5cd4cc2ff08483a0276a10e77f889243eaed0b6f4ada65
-
SHA512
9b67a35c826846676a98774175321cab7f9552001b961dc64019501b1c4ea9102a1388f0141fc3504010a80b75dbe98bfd97f36305c32edab4be1cf498567490
-
SSDEEP
12288:2Mrey90cu71oLAERO8RwxxaauNMr/quOKa+I2R9/DmZMTHKxuEV7J0AHa:QyV61URObXXPOyI2RZIOqxuC76A6
Static task
static1
Behavioral task
behavioral1
Sample
e12bc77e041facd56d5cd4cc2ff08483a0276a10e77f889243eaed0b6f4ada65.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
e12bc77e041facd56d5cd4cc2ff08483a0276a10e77f889243eaed0b6f4ada65
-
Size
726KB
-
MD5
172c8138b24f3fbca6ed2b0c3f0d1271
-
SHA1
841d73c0a24fac522e89f2d86272fe2f0e87ea73
-
SHA256
e12bc77e041facd56d5cd4cc2ff08483a0276a10e77f889243eaed0b6f4ada65
-
SHA512
9b67a35c826846676a98774175321cab7f9552001b961dc64019501b1c4ea9102a1388f0141fc3504010a80b75dbe98bfd97f36305c32edab4be1cf498567490
-
SSDEEP
12288:2Mrey90cu71oLAERO8RwxxaauNMr/quOKa+I2R9/DmZMTHKxuEV7J0AHa:QyV61URObXXPOyI2RZIOqxuC76A6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1