General
-
Target
ef9a14b389e2edd242d5244086558dad68afdfe92798deadb5a9c7447c37c62e
-
Size
964KB
-
Sample
241110-z6xswsvmbw
-
MD5
fc94b043b1823debdda880288622d9c8
-
SHA1
c76d0853c374d3a889bd290dffd0c389f527a3e1
-
SHA256
ef9a14b389e2edd242d5244086558dad68afdfe92798deadb5a9c7447c37c62e
-
SHA512
75cfdc1e6956d260b8dd8adb74f6f24a28983a8e6558b077b8c0174272d7006daf7818d719e9a71c1b5601ac98a3c7a13a72846ef53c2bf970e125decd6e40dd
-
SSDEEP
24576:oy8PJrjT8W6zBCZFpFtKttwnd8KUxW4PjlkyY11tCDs2:vkYW6kZFDtKttr3eygYY
Static task
static1
Behavioral task
behavioral1
Sample
ef9a14b389e2edd242d5244086558dad68afdfe92798deadb5a9c7447c37c62e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
ef9a14b389e2edd242d5244086558dad68afdfe92798deadb5a9c7447c37c62e
-
Size
964KB
-
MD5
fc94b043b1823debdda880288622d9c8
-
SHA1
c76d0853c374d3a889bd290dffd0c389f527a3e1
-
SHA256
ef9a14b389e2edd242d5244086558dad68afdfe92798deadb5a9c7447c37c62e
-
SHA512
75cfdc1e6956d260b8dd8adb74f6f24a28983a8e6558b077b8c0174272d7006daf7818d719e9a71c1b5601ac98a3c7a13a72846ef53c2bf970e125decd6e40dd
-
SSDEEP
24576:oy8PJrjT8W6zBCZFpFtKttwnd8KUxW4PjlkyY11tCDs2:vkYW6kZFDtKttr3eygYY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1