General
-
Target
3e0b289ed011cef707f5a86cb45097b0144a99b9f2441a9eb5b0b06494e242b0
-
Size
500KB
-
Sample
241110-slnk6aymfx
-
MD5
6e7124d822a86431f38758077e7b6471
-
SHA1
5dd397d27e5415ac3279cc1b1bec836a57c30f8d
-
SHA256
3e0b289ed011cef707f5a86cb45097b0144a99b9f2441a9eb5b0b06494e242b0
-
SHA512
5b4c17d42d0d308524663e30c6408c1121d0bcc5b62ef527bbeeb95b4dddaaadb425e7020afad546ed2c6363a252c2247261a5d8c648d0de9281bab9553c3e8e
-
SSDEEP
12288:KMrYy90UXR2e/qQPDQOvKENsIYVr8yt6:Cyn4+NEkyNVhA
Static task
static1
Behavioral task
behavioral1
Sample
3e0b289ed011cef707f5a86cb45097b0144a99b9f2441a9eb5b0b06494e242b0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
3e0b289ed011cef707f5a86cb45097b0144a99b9f2441a9eb5b0b06494e242b0
-
Size
500KB
-
MD5
6e7124d822a86431f38758077e7b6471
-
SHA1
5dd397d27e5415ac3279cc1b1bec836a57c30f8d
-
SHA256
3e0b289ed011cef707f5a86cb45097b0144a99b9f2441a9eb5b0b06494e242b0
-
SHA512
5b4c17d42d0d308524663e30c6408c1121d0bcc5b62ef527bbeeb95b4dddaaadb425e7020afad546ed2c6363a252c2247261a5d8c648d0de9281bab9553c3e8e
-
SSDEEP
12288:KMrYy90UXR2e/qQPDQOvKENsIYVr8yt6:Cyn4+NEkyNVhA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1