General
-
Target
f8fc92916f0c3319ff5d86165c2f6bb5c86a68817559ff4554ec9dba0f2a3870
-
Size
500KB
-
Sample
241110-kpbrrswqan
-
MD5
38d50370fe078144b64ae6a3bddc9b1f
-
SHA1
022a6192e7eff3459a4c3035ebb521e1f517501f
-
SHA256
f8fc92916f0c3319ff5d86165c2f6bb5c86a68817559ff4554ec9dba0f2a3870
-
SHA512
5bdd249e4e9b2e32feb213aab8370c1c92bd749fe7b52c2962daa758d6d5752a8decb231e4b597deebbd2100ccea2c3f7e04a4bf9f95b7795b43469d03c697fe
-
SSDEEP
6144:Kby+bnr+op0yN90QEyZSEe7lIAKktsjj2J78yzEmwFWueEvKJiMENsUsQb9Yz1ge:xMrMy90L97SAZtsj+QDnvKENsSYz/DN
Static task
static1
Behavioral task
behavioral1
Sample
f8fc92916f0c3319ff5d86165c2f6bb5c86a68817559ff4554ec9dba0f2a3870.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
f8fc92916f0c3319ff5d86165c2f6bb5c86a68817559ff4554ec9dba0f2a3870
-
Size
500KB
-
MD5
38d50370fe078144b64ae6a3bddc9b1f
-
SHA1
022a6192e7eff3459a4c3035ebb521e1f517501f
-
SHA256
f8fc92916f0c3319ff5d86165c2f6bb5c86a68817559ff4554ec9dba0f2a3870
-
SHA512
5bdd249e4e9b2e32feb213aab8370c1c92bd749fe7b52c2962daa758d6d5752a8decb231e4b597deebbd2100ccea2c3f7e04a4bf9f95b7795b43469d03c697fe
-
SSDEEP
6144:Kby+bnr+op0yN90QEyZSEe7lIAKktsjj2J78yzEmwFWueEvKJiMENsUsQb9Yz1ge:xMrMy90L97SAZtsj+QDnvKENsSYz/DN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1