General
-
Target
44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf
-
Size
471KB
-
Sample
241110-xqabjswmcn
-
MD5
e8fd64e7342978213b755036dd3d2cd7
-
SHA1
ad37c35ec09467ff2560020b53fadb785e006faa
-
SHA256
44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf
-
SHA512
b806f745b28f7d68278ac1e2d481a094282f2b0fc8d924496db8f965e669eed947619a5a43435e775191925ab7281edc01b32b5e5c5f2df28f12b9f1ad776bc3
-
SSDEEP
12288:vMrPy90rf7dFaTWh6kYfPDsy250AyHeOnP:cyY6TWhGHDOw+sP
Static task
static1
Behavioral task
behavioral1
Sample
44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf
-
Size
471KB
-
MD5
e8fd64e7342978213b755036dd3d2cd7
-
SHA1
ad37c35ec09467ff2560020b53fadb785e006faa
-
SHA256
44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf
-
SHA512
b806f745b28f7d68278ac1e2d481a094282f2b0fc8d924496db8f965e669eed947619a5a43435e775191925ab7281edc01b32b5e5c5f2df28f12b9f1ad776bc3
-
SSDEEP
12288:vMrPy90rf7dFaTWh6kYfPDsy250AyHeOnP:cyY6TWhGHDOw+sP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1