General
-
Target
8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98fN
-
Size
500KB
-
Sample
241110-ptfzhazmer
-
MD5
5d9d5531189b29e23a3990479d212890
-
SHA1
8023e3c546b7620bea6bf369746a9f0267bacea8
-
SHA256
8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98f
-
SHA512
0c20389b2a29647669957e92190b1f9e5d6d7cb606db9d635f8a221fdf2a860b08e023dce7eaf455640b18db475581a3469dabf4ea56af6a8a6cb3f5e61c61ab
-
SSDEEP
12288:wMrWy90La13xJ6NI67oRcz8OZW/ni1FgBqm8jA:2y8a137h6d8gW/kGkBk
Static task
static1
Behavioral task
behavioral1
Sample
8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98fN
-
Size
500KB
-
MD5
5d9d5531189b29e23a3990479d212890
-
SHA1
8023e3c546b7620bea6bf369746a9f0267bacea8
-
SHA256
8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98f
-
SHA512
0c20389b2a29647669957e92190b1f9e5d6d7cb606db9d635f8a221fdf2a860b08e023dce7eaf455640b18db475581a3469dabf4ea56af6a8a6cb3f5e61c61ab
-
SSDEEP
12288:wMrWy90La13xJ6NI67oRcz8OZW/ni1FgBqm8jA:2y8a137h6d8gW/kGkBk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1