General
-
Target
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a
-
Size
725KB
-
Sample
241111-bybnpazanj
-
MD5
67da56205d0a8e12f51be225976acded
-
SHA1
45ba6c4747743711d887fcaa27c6db1a1b6382bd
-
SHA256
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a
-
SHA512
35086ec73d4b85049813c730609502605585b2244619bc26fde5b9afedd566e416bfe24f9c272a451652df030abedb6634fae2c1715bbd4b85e8357f31c79415
-
SSDEEP
12288:HMroy90kpRDsEPU2P6dY6Ijz6bNcaaYlMvplrd65mN06XYQRWHqyRhqlPblu:PybpRDJPKdvAycLpl0h6XYQ4KyRIXu
Static task
static1
Behavioral task
behavioral1
Sample
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a
-
Size
725KB
-
MD5
67da56205d0a8e12f51be225976acded
-
SHA1
45ba6c4747743711d887fcaa27c6db1a1b6382bd
-
SHA256
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a
-
SHA512
35086ec73d4b85049813c730609502605585b2244619bc26fde5b9afedd566e416bfe24f9c272a451652df030abedb6634fae2c1715bbd4b85e8357f31c79415
-
SSDEEP
12288:HMroy90kpRDsEPU2P6dY6Ijz6bNcaaYlMvplrd65mN06XYQRWHqyRhqlPblu:PybpRDJPKdvAycLpl0h6XYQ4KyRIXu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1