General
-
Target
74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535
-
Size
484KB
-
Sample
241110-hqg9ts1ncz
-
MD5
2564ed7ef018c9c17fa172c999369257
-
SHA1
60930bbe78517f166fc6a54205456b55107904b3
-
SHA256
74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535
-
SHA512
7f0d7c0576ee20c00417e2d1d909416ebdcc74e786db6ff95ac531837a5bfe3c12f7a1e7a139972b243bfb538c19a6c82d8586da73825d70c1792b1dfd8c3179
-
SSDEEP
12288:AMrIy90dw8qjwZxPewC635udypICki6AfYP:YyMKjwZxPW6JDpIGfQ
Static task
static1
Behavioral task
behavioral1
Sample
74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535
-
Size
484KB
-
MD5
2564ed7ef018c9c17fa172c999369257
-
SHA1
60930bbe78517f166fc6a54205456b55107904b3
-
SHA256
74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535
-
SHA512
7f0d7c0576ee20c00417e2d1d909416ebdcc74e786db6ff95ac531837a5bfe3c12f7a1e7a139972b243bfb538c19a6c82d8586da73825d70c1792b1dfd8c3179
-
SSDEEP
12288:AMrIy90dw8qjwZxPewC635udypICki6AfYP:YyMKjwZxPW6JDpIGfQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1