General
-
Target
2bb648ae9fd9bdc106bd9b7fa0d0c12c9e65b9e09b51748f870dea4d63a0a150
-
Size
478KB
-
Sample
241110-xwh6mssnds
-
MD5
45beaa07594e4a54ecca4b06ac758ba6
-
SHA1
7570695eab043fa2b90d27b70a5a91e90bd404fd
-
SHA256
2bb648ae9fd9bdc106bd9b7fa0d0c12c9e65b9e09b51748f870dea4d63a0a150
-
SHA512
2d59ba1dd4d15c530252f5a9356cd0981c43240a4b43b062d0a03946e713f1eb4d8e2b7520a4cbc8b0631bcefe33cbb9bfc52a28442bfff72417bf22f21c5435
-
SSDEEP
12288:NMr/y90FVmmGKs8tnaoTix+WmmerCxjZ9z:Cy+tVs2ixV4rCxz
Static task
static1
Behavioral task
behavioral1
Sample
2bb648ae9fd9bdc106bd9b7fa0d0c12c9e65b9e09b51748f870dea4d63a0a150.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
2bb648ae9fd9bdc106bd9b7fa0d0c12c9e65b9e09b51748f870dea4d63a0a150
-
Size
478KB
-
MD5
45beaa07594e4a54ecca4b06ac758ba6
-
SHA1
7570695eab043fa2b90d27b70a5a91e90bd404fd
-
SHA256
2bb648ae9fd9bdc106bd9b7fa0d0c12c9e65b9e09b51748f870dea4d63a0a150
-
SHA512
2d59ba1dd4d15c530252f5a9356cd0981c43240a4b43b062d0a03946e713f1eb4d8e2b7520a4cbc8b0631bcefe33cbb9bfc52a28442bfff72417bf22f21c5435
-
SSDEEP
12288:NMr/y90FVmmGKs8tnaoTix+WmmerCxjZ9z:Cy+tVs2ixV4rCxz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1