General
-
Target
224ac05c02f3e62ea5bc99ba9b603921d1147c27c32901998f8dc9ef525919e4
-
Size
538KB
-
Sample
241111-awg71sxqa1
-
MD5
6f3caf0e5e807f27e8ebb679c54a4afa
-
SHA1
6f272ec22abc3c995b0e6a0077f315136ec73aad
-
SHA256
224ac05c02f3e62ea5bc99ba9b603921d1147c27c32901998f8dc9ef525919e4
-
SHA512
65de4ce23d8aa7c42bfb776989939b84139be390591e4a44dd657371d311b2a8b348585288fccf69d228b4a26e91f2bc7eab66a8eb0a41262d2257548082e09e
-
SSDEEP
12288:2Mroy90eJXnrVaa5tZoPJnCE7CGJiZWXkEYE3mb5vHmf:WyvVl5tZUVRyxU
Static task
static1
Behavioral task
behavioral1
Sample
224ac05c02f3e62ea5bc99ba9b603921d1147c27c32901998f8dc9ef525919e4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
224ac05c02f3e62ea5bc99ba9b603921d1147c27c32901998f8dc9ef525919e4
-
Size
538KB
-
MD5
6f3caf0e5e807f27e8ebb679c54a4afa
-
SHA1
6f272ec22abc3c995b0e6a0077f315136ec73aad
-
SHA256
224ac05c02f3e62ea5bc99ba9b603921d1147c27c32901998f8dc9ef525919e4
-
SHA512
65de4ce23d8aa7c42bfb776989939b84139be390591e4a44dd657371d311b2a8b348585288fccf69d228b4a26e91f2bc7eab66a8eb0a41262d2257548082e09e
-
SSDEEP
12288:2Mroy90eJXnrVaa5tZoPJnCE7CGJiZWXkEYE3mb5vHmf:WyvVl5tZUVRyxU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1