General
-
Target
30b9bdb7017d3104ca04ed219241aaea941bfca5d40f4d6eacea2bc6a82f2e71
-
Size
500KB
-
Sample
241110-tq4cvazgll
-
MD5
6d8f382cbde2d9eb3704fe56ee4ca2f3
-
SHA1
5b9c8b08ac28cf72275562b6636024578e0209c3
-
SHA256
30b9bdb7017d3104ca04ed219241aaea941bfca5d40f4d6eacea2bc6a82f2e71
-
SHA512
47bfd972fde0561b7a5421eec42fc1455f0ec0bfb56d8c59ce28f4368bfc6a1291e2b1826542b1febbba95295136cf816e2203aafc7b968ab611201fd4be63cf
-
SSDEEP
12288:LMrdy90YTKFw9A4U4w1eol82LkGiS8G/SzC6ubLEOo:yyH7O4kqbSL6u3O
Static task
static1
Behavioral task
behavioral1
Sample
30b9bdb7017d3104ca04ed219241aaea941bfca5d40f4d6eacea2bc6a82f2e71.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
30b9bdb7017d3104ca04ed219241aaea941bfca5d40f4d6eacea2bc6a82f2e71
-
Size
500KB
-
MD5
6d8f382cbde2d9eb3704fe56ee4ca2f3
-
SHA1
5b9c8b08ac28cf72275562b6636024578e0209c3
-
SHA256
30b9bdb7017d3104ca04ed219241aaea941bfca5d40f4d6eacea2bc6a82f2e71
-
SHA512
47bfd972fde0561b7a5421eec42fc1455f0ec0bfb56d8c59ce28f4368bfc6a1291e2b1826542b1febbba95295136cf816e2203aafc7b968ab611201fd4be63cf
-
SSDEEP
12288:LMrdy90YTKFw9A4U4w1eol82LkGiS8G/SzC6ubLEOo:yyH7O4kqbSL6u3O
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1