General
-
Target
11037183946cb0a0a093bdcf3d2482c0d337292c716c7b1cdb338e3d204179e2
-
Size
470KB
-
Sample
241110-e2agkszeja
-
MD5
2e52a44a7f1d6c9a982377ce18d150a3
-
SHA1
793b34b8b2f6a39a490d1f88c1ba5e827d35b04f
-
SHA256
11037183946cb0a0a093bdcf3d2482c0d337292c716c7b1cdb338e3d204179e2
-
SHA512
af4b784e574e7c10c24ea05704c9a671f55f20f4558bef1d6080015ca9e8d0356321b070a1a9e2a530904920dc103dde619e41f119ff1e38d72b2e308eed57c2
-
SSDEEP
12288:LMrly90C+yIjGl1zmnGoVoD9dW/D3xkWPR2X:+yp+3GPWGoo9dWTBRk
Static task
static1
Behavioral task
behavioral1
Sample
11037183946cb0a0a093bdcf3d2482c0d337292c716c7b1cdb338e3d204179e2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
11037183946cb0a0a093bdcf3d2482c0d337292c716c7b1cdb338e3d204179e2
-
Size
470KB
-
MD5
2e52a44a7f1d6c9a982377ce18d150a3
-
SHA1
793b34b8b2f6a39a490d1f88c1ba5e827d35b04f
-
SHA256
11037183946cb0a0a093bdcf3d2482c0d337292c716c7b1cdb338e3d204179e2
-
SHA512
af4b784e574e7c10c24ea05704c9a671f55f20f4558bef1d6080015ca9e8d0356321b070a1a9e2a530904920dc103dde619e41f119ff1e38d72b2e308eed57c2
-
SSDEEP
12288:LMrly90C+yIjGl1zmnGoVoD9dW/D3xkWPR2X:+yp+3GPWGoo9dWTBRk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1