General
-
Target
a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471
-
Size
500KB
-
Sample
241111-cw6lqazlgz
-
MD5
c0ce96402e4a30fa59c875ca28d188b7
-
SHA1
0d3dceca4f323f2b8dc6193b8da24ac36846f2f0
-
SHA256
a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471
-
SHA512
4b175b35d4f416247f396e891f6d6b8de337563e499e708345d5538310b236a8d1425f6c67c0cfe17f28821296b342f2b53124933481ab0688f2634c4932b697
-
SSDEEP
6144:Kay+bnr+Op0yN90QEm1fNQfRIYRlc6a2BV71IwCXJpZv36VnmbWYGimHycllTV5Z:CMray90EHQGfMI1BbWZlTG0
Static task
static1
Behavioral task
behavioral1
Sample
a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471
-
Size
500KB
-
MD5
c0ce96402e4a30fa59c875ca28d188b7
-
SHA1
0d3dceca4f323f2b8dc6193b8da24ac36846f2f0
-
SHA256
a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471
-
SHA512
4b175b35d4f416247f396e891f6d6b8de337563e499e708345d5538310b236a8d1425f6c67c0cfe17f28821296b342f2b53124933481ab0688f2634c4932b697
-
SSDEEP
6144:Kay+bnr+Op0yN90QEm1fNQfRIYRlc6a2BV71IwCXJpZv36VnmbWYGimHycllTV5Z:CMray90EHQGfMI1BbWZlTG0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1