General
-
Target
8d2b5fc73f5d6ce0091f57a74c5beeca21e2b8f5e158df25b5840b340b791261
-
Size
550KB
-
Sample
241111-brb1wayhlk
-
MD5
75eee23572a8633c40cc500b5230ea6a
-
SHA1
c709c56309cde30e4bcd5624801d453cf1c85ddb
-
SHA256
8d2b5fc73f5d6ce0091f57a74c5beeca21e2b8f5e158df25b5840b340b791261
-
SHA512
ab8e58c9e0c06f805593773a8c38270b9448ef240cf701033f6c5b40067461414b131131b28391b71ea1dd5735d7ec9b7343991ec962add2fba0ae14ab7cc2f3
-
SSDEEP
12288:2Mrhy90PoFq1NEVphlMbl35YnZvG2744pP9fU+5Q8RyJ0rUwgY:Xyh01GVp7435oG2DplfUp8RySrUY
Static task
static1
Behavioral task
behavioral1
Sample
8d2b5fc73f5d6ce0091f57a74c5beeca21e2b8f5e158df25b5840b340b791261.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
8d2b5fc73f5d6ce0091f57a74c5beeca21e2b8f5e158df25b5840b340b791261
-
Size
550KB
-
MD5
75eee23572a8633c40cc500b5230ea6a
-
SHA1
c709c56309cde30e4bcd5624801d453cf1c85ddb
-
SHA256
8d2b5fc73f5d6ce0091f57a74c5beeca21e2b8f5e158df25b5840b340b791261
-
SHA512
ab8e58c9e0c06f805593773a8c38270b9448ef240cf701033f6c5b40067461414b131131b28391b71ea1dd5735d7ec9b7343991ec962add2fba0ae14ab7cc2f3
-
SSDEEP
12288:2Mrhy90PoFq1NEVphlMbl35YnZvG2744pP9fU+5Q8RyJ0rUwgY:Xyh01GVp7435oG2DplfUp8RySrUY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1