General
-
Target
8ddda918214cc3b54bc8b61cb58ee474354daa0c7ffd3f805d958213aa9acc31
-
Size
957KB
-
Sample
241111-a5py8aydqj
-
MD5
633e66c7e929382352cb3dfa84b01d86
-
SHA1
65bc00fad6286a20a0870a9479998f64d0264567
-
SHA256
8ddda918214cc3b54bc8b61cb58ee474354daa0c7ffd3f805d958213aa9acc31
-
SHA512
138acc56e8ae4d8c72224595124fe8f4fdafb627755ae095b8c613656b8b96890b5633c61ef16a57d0b68571a0d88cbf79b1cd05b9322fecb41c46df4b4bcc9b
-
SSDEEP
24576:QyuLb7rQjuuvyxJq+hoj36GWeVv81kwi1jDBB1Ke+40jS:XgvMjJvyxJq+h236jc82wmH31Ke6j
Static task
static1
Behavioral task
behavioral1
Sample
8ddda918214cc3b54bc8b61cb58ee474354daa0c7ffd3f805d958213aa9acc31.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
8ddda918214cc3b54bc8b61cb58ee474354daa0c7ffd3f805d958213aa9acc31
-
Size
957KB
-
MD5
633e66c7e929382352cb3dfa84b01d86
-
SHA1
65bc00fad6286a20a0870a9479998f64d0264567
-
SHA256
8ddda918214cc3b54bc8b61cb58ee474354daa0c7ffd3f805d958213aa9acc31
-
SHA512
138acc56e8ae4d8c72224595124fe8f4fdafb627755ae095b8c613656b8b96890b5633c61ef16a57d0b68571a0d88cbf79b1cd05b9322fecb41c46df4b4bcc9b
-
SSDEEP
24576:QyuLb7rQjuuvyxJq+hoj36GWeVv81kwi1jDBB1Ke+40jS:XgvMjJvyxJq+h236jc82wmH31Ke6j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1