General
-
Target
34dd401b8fde76aadeefc1d8999017db39b3aedc5b3c88839edda04da790df08
-
Size
427KB
-
Sample
241111-ccwbmszgpb
-
MD5
00167d5e77f6d2ba4ca4dbd2cd2b6132
-
SHA1
31cd3223aebea735a22d3a04a3aedbc505d38cf9
-
SHA256
34dd401b8fde76aadeefc1d8999017db39b3aedc5b3c88839edda04da790df08
-
SHA512
86c5cd7eb7cda2d6bab7e93947317684a7b89d6e5d8103530484dda757e38aa5948c8867c354dc4e11c46faea3336964f70a57f44829db1380722193aa9f43a9
-
SSDEEP
12288:/2jKMhUnaGdMkaZSFES/PqAmTpKes1jnuMFpC0A:hMh3GCkaS3NmTrmDC0A
Static task
static1
Behavioral task
behavioral1
Sample
b07b85dcad43a6ec554d4f1c2de7dd67ae73ec34fa2bd295db7dd29ae90f5f36.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
b07b85dcad43a6ec554d4f1c2de7dd67ae73ec34fa2bd295db7dd29ae90f5f36.exe
-
Size
478KB
-
MD5
1ee56a32b1338908490778968a08619b
-
SHA1
0472337f0b40ae3d4e27f8c2d294ba0920fa63b6
-
SHA256
b07b85dcad43a6ec554d4f1c2de7dd67ae73ec34fa2bd295db7dd29ae90f5f36
-
SHA512
fbf18f7a00256ee1491e661b876bbce12bcc70bed9c0fd47ac2dfbab18f5afc6f6c6f58d79b8a169aa88bed11571fe8c93dff129b7af7279ffed23c4b12b12e9
-
SSDEEP
6144:KZy+bnr+Xp0yN90QEFaM2gBY+iX7Z8L4BghdCEK+XvM7urK0aZiqPH/Jwuak+kMm:bMr7y90faJGYp7Z8L4kLsQ1aZ9X2bnm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1