General
-
Target
e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5
-
Size
478KB
-
Sample
241110-a8zb3aymgm
-
MD5
dc130d950dcffd72d6c534781751bfce
-
SHA1
1bf9cb6064984d68be4c554613a73bbce76d6efb
-
SHA256
e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5
-
SHA512
4b30eca8ff5feaf3c49e9e305d3801be521f8b4df80432b1663fd64e5a7bae9e8884b428918010aa0ed2f57213a8e244c51aaf7ac3ee1450c4e30eaaf41222c0
-
SSDEEP
12288:NMrvy90stLDJSVRj7rxwqm0Uj1HKRmTz72ZvO:WypCVR12bdKATHmvO
Static task
static1
Behavioral task
behavioral1
Sample
e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5
-
Size
478KB
-
MD5
dc130d950dcffd72d6c534781751bfce
-
SHA1
1bf9cb6064984d68be4c554613a73bbce76d6efb
-
SHA256
e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5
-
SHA512
4b30eca8ff5feaf3c49e9e305d3801be521f8b4df80432b1663fd64e5a7bae9e8884b428918010aa0ed2f57213a8e244c51aaf7ac3ee1450c4e30eaaf41222c0
-
SSDEEP
12288:NMrvy90stLDJSVRj7rxwqm0Uj1HKRmTz72ZvO:WypCVR12bdKATHmvO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1