General
-
Target
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119
-
Size
477KB
-
Sample
241111-ahgz4ayajj
-
MD5
aa7b3fe90b2d477b5db2afa25388554d
-
SHA1
67da7669d32ada781633e2e347f369ad090b1dbb
-
SHA256
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119
-
SHA512
f7bd5c45583545edd171bfcf91ebef189d8f101851e8f22966b565aaf78551d7be560742908f43252659c98fa31d30888662a80ccdbfa5e7a190a61009da2f0f
-
SSDEEP
6144:KCy+bnr+vp0yN90QE3PKapC3UBzsDY+4CbYfIHSkY7Vt19IqoAHNxb0K48rVBhSc:KMr3y90kapxAXSkWV7GT24YKs
Static task
static1
Behavioral task
behavioral1
Sample
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Targets
-
-
Target
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119
-
Size
477KB
-
MD5
aa7b3fe90b2d477b5db2afa25388554d
-
SHA1
67da7669d32ada781633e2e347f369ad090b1dbb
-
SHA256
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119
-
SHA512
f7bd5c45583545edd171bfcf91ebef189d8f101851e8f22966b565aaf78551d7be560742908f43252659c98fa31d30888662a80ccdbfa5e7a190a61009da2f0f
-
SSDEEP
6144:KCy+bnr+vp0yN90QE3PKapC3UBzsDY+4CbYfIHSkY7Vt19IqoAHNxb0K48rVBhSc:KMr3y90kapxAXSkWV7GT24YKs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1