General
-
Target
1198039da98771695a6a303f31edd5cdce81a63eeee9fb9e4094c718e76bd898
-
Size
386KB
-
Sample
241111-cq1taatmcl
-
MD5
191c5a48b2e19d277dcb8405169f26bc
-
SHA1
9ce7c938830616bfcb84045713c0c3e44e2a59fe
-
SHA256
1198039da98771695a6a303f31edd5cdce81a63eeee9fb9e4094c718e76bd898
-
SHA512
7c9807da74287db96ce5584bae4a2c9eb9da576df8346104cabf618ee64c89ecea3bc6161b18afa5f85526452dcb3d927ec6d65a6d340e1595270c047112ddb1
-
SSDEEP
6144:K/y+bnr+rp0yN90QEfCemQ4pGsl2aRpjf2nJV2h2/enwArs7V/MpxgpxyN:NMrDy90FCeruTir2hmfx/2KpW
Static task
static1
Behavioral task
behavioral1
Sample
1198039da98771695a6a303f31edd5cdce81a63eeee9fb9e4094c718e76bd898.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
1198039da98771695a6a303f31edd5cdce81a63eeee9fb9e4094c718e76bd898
-
Size
386KB
-
MD5
191c5a48b2e19d277dcb8405169f26bc
-
SHA1
9ce7c938830616bfcb84045713c0c3e44e2a59fe
-
SHA256
1198039da98771695a6a303f31edd5cdce81a63eeee9fb9e4094c718e76bd898
-
SHA512
7c9807da74287db96ce5584bae4a2c9eb9da576df8346104cabf618ee64c89ecea3bc6161b18afa5f85526452dcb3d927ec6d65a6d340e1595270c047112ddb1
-
SSDEEP
6144:K/y+bnr+rp0yN90QEfCemQ4pGsl2aRpjf2nJV2h2/enwArs7V/MpxgpxyN:NMrDy90FCeruTir2hmfx/2KpW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1