General
-
Target
660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6
-
Size
724KB
-
Sample
241110-jhfayawjbl
-
MD5
6e10262338bc442ff464900283a217be
-
SHA1
10688129c36314401f23d57c0e32641f4a89ee86
-
SHA256
660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6
-
SHA512
4ef8f527d196b6f7376b2d6c446942fdb1d37b121ecc76cd7433387cdfc5a74146cb9274b6c71230c11136e5d2feb4e87c6a73d54bc0e126d15e361fd4660f0c
-
SSDEEP
12288:0MrDy90BJloOKi0ZYp3Yf1Xvi+LOr7lSjAagW+I5X8dk+bp186VYptok+TU:3yuJwi0o3Yf1q+WUjgKZ+bj83MU
Static task
static1
Behavioral task
behavioral1
Sample
660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6
-
Size
724KB
-
MD5
6e10262338bc442ff464900283a217be
-
SHA1
10688129c36314401f23d57c0e32641f4a89ee86
-
SHA256
660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6
-
SHA512
4ef8f527d196b6f7376b2d6c446942fdb1d37b121ecc76cd7433387cdfc5a74146cb9274b6c71230c11136e5d2feb4e87c6a73d54bc0e126d15e361fd4660f0c
-
SSDEEP
12288:0MrDy90BJloOKi0ZYp3Yf1Xvi+LOr7lSjAagW+I5X8dk+bp186VYptok+TU:3yuJwi0o3Yf1q+WUjgKZ+bj83MU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1