General
-
Target
bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7
-
Size
470KB
-
Sample
241110-cqdnraxemf
-
MD5
c010667e140c2ea4746e0e7d1d9cb052
-
SHA1
c177132cc7aeff9d4cd895174a1a98c9febbad36
-
SHA256
bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7
-
SHA512
081f375dd3c773fe4f76f1bf4db17755b2ebbd9e85ff36bd4d28491bd8f48f52ba24ec1a1f55663488d8c2f4345679c20a32d006ec6a68ab1e4c5c43d7b94228
-
SSDEEP
12288:jMr1y906s0jPgzDFerOGZ+TwsiCvt+9xVVhgued:ay+08XFlRss9t+bVV+ued
Static task
static1
Behavioral task
behavioral1
Sample
bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7
-
Size
470KB
-
MD5
c010667e140c2ea4746e0e7d1d9cb052
-
SHA1
c177132cc7aeff9d4cd895174a1a98c9febbad36
-
SHA256
bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7
-
SHA512
081f375dd3c773fe4f76f1bf4db17755b2ebbd9e85ff36bd4d28491bd8f48f52ba24ec1a1f55663488d8c2f4345679c20a32d006ec6a68ab1e4c5c43d7b94228
-
SSDEEP
12288:jMr1y906s0jPgzDFerOGZ+TwsiCvt+9xVVhgued:ay+08XFlRss9t+bVV+ued
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1