General
-
Target
295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029
-
Size
470KB
-
Sample
241110-mc3qtstqhz
-
MD5
df95c994b48bc8ee6dc85f8d30d16544
-
SHA1
6175e21812eb40b18092420c727d065876c2d287
-
SHA256
295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029
-
SHA512
429cb1695f337d63a5a72585d199914be581d11b0ff1d0cc548d24a14ad2658ed1ad390b3e5e06cafe1ee9c391b32ee54b658a03016e809d8d2fad7f24f33d5c
-
SSDEEP
6144:Kny+bnr+hp0yN90QEYEmPHCqKpF3jPKNDj/WC/nHgrEELilBh0EHur9mwafmVV3w:ZMr5y90YHCqKpJ6PDFg91VV3gWc
Static task
static1
Behavioral task
behavioral1
Sample
295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029
-
Size
470KB
-
MD5
df95c994b48bc8ee6dc85f8d30d16544
-
SHA1
6175e21812eb40b18092420c727d065876c2d287
-
SHA256
295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029
-
SHA512
429cb1695f337d63a5a72585d199914be581d11b0ff1d0cc548d24a14ad2658ed1ad390b3e5e06cafe1ee9c391b32ee54b658a03016e809d8d2fad7f24f33d5c
-
SSDEEP
6144:Kny+bnr+hp0yN90QEYEmPHCqKpF3jPKNDj/WC/nHgrEELilBh0EHur9mwafmVV3w:ZMr5y90YHCqKpJ6PDFg91VV3gWc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1