General
-
Target
bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c
-
Size
479KB
-
Sample
241111-azbveayfpg
-
MD5
3affbc99cbfd6e036d894be7e7257bca
-
SHA1
6262f739d038a64c57626fad817a02f509f28155
-
SHA256
bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c
-
SHA512
83d5d59b438030e1de71bf0e26e5a137fc6c1992ca6d8c62bb3a89a9cdf960dcd763b0e1d40505ad266704f43f9d4ff71e4b6abf7b2fa19860563d1da84b4c88
-
SSDEEP
6144:Kjy+bnr+xp0yN90QEw2WhHm2zU8OD4Xl8S99zYj78CqMS9+mycd5CbMiLAii:xMrhy90XWhHp8418+K7/S9JyPbMis/
Static task
static1
Behavioral task
behavioral1
Sample
bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
murka
217.196.96.101:4132
-
auth_value
878a0681ac6ad0e4eb10ef9db07abdd9
Targets
-
-
Target
bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c
-
Size
479KB
-
MD5
3affbc99cbfd6e036d894be7e7257bca
-
SHA1
6262f739d038a64c57626fad817a02f509f28155
-
SHA256
bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c
-
SHA512
83d5d59b438030e1de71bf0e26e5a137fc6c1992ca6d8c62bb3a89a9cdf960dcd763b0e1d40505ad266704f43f9d4ff71e4b6abf7b2fa19860563d1da84b4c88
-
SSDEEP
6144:Kjy+bnr+xp0yN90QEw2WhHm2zU8OD4Xl8S99zYj78CqMS9+mycd5CbMiLAii:xMrhy90XWhHp8418+K7/S9JyPbMis/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1