General
-
Target
6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa
-
Size
1000KB
-
Sample
241110-3prgbsxemr
-
MD5
2d3a2eb1cc97aabf32a3eb07cc685837
-
SHA1
a66a41bd4b6bf0c3a91a65c971d2b804690c5d3d
-
SHA256
6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa
-
SHA512
7f34056385db0d7e6387d1cafc9eae41015a7c591b5e642f8870d746e076c95a258ed18890a72f73a3d75e65aec4d219c4053e32fcab1162dc4f4df0c8edcae0
-
SSDEEP
24576:bym4Y46VJi6/9RfDMxm7ssOz7n4gUK85k:Om4F6zZ1RfDIJT4T
Static task
static1
Behavioral task
behavioral1
Sample
6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa
-
Size
1000KB
-
MD5
2d3a2eb1cc97aabf32a3eb07cc685837
-
SHA1
a66a41bd4b6bf0c3a91a65c971d2b804690c5d3d
-
SHA256
6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa
-
SHA512
7f34056385db0d7e6387d1cafc9eae41015a7c591b5e642f8870d746e076c95a258ed18890a72f73a3d75e65aec4d219c4053e32fcab1162dc4f4df0c8edcae0
-
SSDEEP
24576:bym4Y46VJi6/9RfDMxm7ssOz7n4gUK85k:Om4F6zZ1RfDIJT4T
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1