General
-
Target
fa8bacfbe7b3ce5707e1109ba128c89730d89f544ee114e5761209fbd8085d31
-
Size
526KB
-
Sample
241111-am7rbayaqk
-
MD5
474fb64bd48ff69ac5581afa2a5f0242
-
SHA1
0f738e22a3ea1db1cccd3f06a2535cac6bbb5cb0
-
SHA256
fa8bacfbe7b3ce5707e1109ba128c89730d89f544ee114e5761209fbd8085d31
-
SHA512
2ade7866b7ec2ddfcb5fddfcf9692e5850442ed639e4d29efb45adb9aac2254bba44920de49b4c5bae3f60be2ffcc26a07ba811a112c9a2d8164110a19bdab4e
-
SSDEEP
6144:KHy+bnr+gp0yN90QEJBfDJVsI4pF/UvClJbUfGjjgVtpza5NejaykwnwZrt3rqgj:dMrUy90JJVWF/VgVtx8elw9t3/D
Static task
static1
Behavioral task
behavioral1
Sample
fa8bacfbe7b3ce5707e1109ba128c89730d89f544ee114e5761209fbd8085d31.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
fa8bacfbe7b3ce5707e1109ba128c89730d89f544ee114e5761209fbd8085d31
-
Size
526KB
-
MD5
474fb64bd48ff69ac5581afa2a5f0242
-
SHA1
0f738e22a3ea1db1cccd3f06a2535cac6bbb5cb0
-
SHA256
fa8bacfbe7b3ce5707e1109ba128c89730d89f544ee114e5761209fbd8085d31
-
SHA512
2ade7866b7ec2ddfcb5fddfcf9692e5850442ed639e4d29efb45adb9aac2254bba44920de49b4c5bae3f60be2ffcc26a07ba811a112c9a2d8164110a19bdab4e
-
SSDEEP
6144:KHy+bnr+gp0yN90QEJBfDJVsI4pF/UvClJbUfGjjgVtpza5NejaykwnwZrt3rqgj:dMrUy90JJVWF/VgVtx8elw9t3/D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1