General
-
Target
380a1fa58c7fed23c80a3b13bdedef5aae748d79d1f4eba207e52dff9f08ee36
-
Size
526KB
-
Sample
241111-azm8fa1rbl
-
MD5
6035d65be08dd531a76114e6f2533325
-
SHA1
e48e7ce83835bcde2101384d961bb621099fdebb
-
SHA256
380a1fa58c7fed23c80a3b13bdedef5aae748d79d1f4eba207e52dff9f08ee36
-
SHA512
7cd7ff7c2953d7c772fe6de67537e3bf42b113ab87f4bc7f3336112950e824f2f0be9013f1e07c33c1e3b7d4b298e7935616ceb6f5d6d1fd0a7b984d80981df1
-
SSDEEP
12288:eMr1y90wsXGIgvJ8hBk6O8DqmJ+Ddg1B8Rufhz1:/yvR8MxQ3oRGBPh
Static task
static1
Behavioral task
behavioral1
Sample
380a1fa58c7fed23c80a3b13bdedef5aae748d79d1f4eba207e52dff9f08ee36.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Targets
-
-
Target
380a1fa58c7fed23c80a3b13bdedef5aae748d79d1f4eba207e52dff9f08ee36
-
Size
526KB
-
MD5
6035d65be08dd531a76114e6f2533325
-
SHA1
e48e7ce83835bcde2101384d961bb621099fdebb
-
SHA256
380a1fa58c7fed23c80a3b13bdedef5aae748d79d1f4eba207e52dff9f08ee36
-
SHA512
7cd7ff7c2953d7c772fe6de67537e3bf42b113ab87f4bc7f3336112950e824f2f0be9013f1e07c33c1e3b7d4b298e7935616ceb6f5d6d1fd0a7b984d80981df1
-
SSDEEP
12288:eMr1y90wsXGIgvJ8hBk6O8DqmJ+Ddg1B8Rufhz1:/yvR8MxQ3oRGBPh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1