General
-
Target
74f84309434048ccc053eea3d9f470ea499e7719be67dd1ce72600e3a9115f35.exe
-
Size
415KB
-
Sample
241111-cb16hazgme
-
MD5
a5b1866cb3b781d77df0d93ed11ce153
-
SHA1
94e86846b4f68123187a704628184dfcfc296533
-
SHA256
74f84309434048ccc053eea3d9f470ea499e7719be67dd1ce72600e3a9115f35
-
SHA512
627b29fe528972a86d8a65a9cfd26e892f6693efeb32bc37ca282719942ab7e47aaf08a04287943b6cbb05e17c62443b7dfa0c8c05c90c8348e5441656d71974
-
SSDEEP
12288:yMr0y90mMoFyX4qJrxtdQaOGDvGrWsYaE9S:GyxMmQ4MltdQa9DvvspE9S
Static task
static1
Behavioral task
behavioral1
Sample
74f84309434048ccc053eea3d9f470ea499e7719be67dd1ce72600e3a9115f35.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
74f84309434048ccc053eea3d9f470ea499e7719be67dd1ce72600e3a9115f35.exe
-
Size
415KB
-
MD5
a5b1866cb3b781d77df0d93ed11ce153
-
SHA1
94e86846b4f68123187a704628184dfcfc296533
-
SHA256
74f84309434048ccc053eea3d9f470ea499e7719be67dd1ce72600e3a9115f35
-
SHA512
627b29fe528972a86d8a65a9cfd26e892f6693efeb32bc37ca282719942ab7e47aaf08a04287943b6cbb05e17c62443b7dfa0c8c05c90c8348e5441656d71974
-
SSDEEP
12288:yMr0y90mMoFyX4qJrxtdQaOGDvGrWsYaE9S:GyxMmQ4MltdQa9DvvspE9S
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1