General
-
Target
d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528
-
Size
483KB
-
Sample
241110-q6q6nsxhlq
-
MD5
a822868f40829b1c69a4ffad922ee04a
-
SHA1
780982b4ccad3383d7a359e97054b092ddad5f97
-
SHA256
d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528
-
SHA512
3f0149c206222efc2391ce41e72151f5bf0c5ae2f94b4408650cb8c8b6599de2711dafe1168cd2d3b68d3fc7ea527ca2a26cd032c7410b8ea972e7beff3b9a34
-
SSDEEP
12288:NMrEy90JfcUObK2MWLdwsdL02kgN4wsjzfduI0bnh:Rywc3lmsdLEG4lfdybh
Static task
static1
Behavioral task
behavioral1
Sample
d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528
-
Size
483KB
-
MD5
a822868f40829b1c69a4ffad922ee04a
-
SHA1
780982b4ccad3383d7a359e97054b092ddad5f97
-
SHA256
d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528
-
SHA512
3f0149c206222efc2391ce41e72151f5bf0c5ae2f94b4408650cb8c8b6599de2711dafe1168cd2d3b68d3fc7ea527ca2a26cd032c7410b8ea972e7beff3b9a34
-
SSDEEP
12288:NMrEy90JfcUObK2MWLdwsdL02kgN4wsjzfduI0bnh:Rywc3lmsdLEG4lfdybh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1