General
-
Target
f307a90e97f39948643f20a1ca72626ec06ef4c24709dbb3616146be8e8598f4
-
Size
538KB
-
Sample
241111-cx2n6azmbs
-
MD5
ae3bad0bcc02c1175277897be996b49b
-
SHA1
41935127ea52426cb028575129033c5aafc5b2b0
-
SHA256
f307a90e97f39948643f20a1ca72626ec06ef4c24709dbb3616146be8e8598f4
-
SHA512
277038a562306b678276c9f8c3f6e8bd0a8a89436285dcee71667fc40185928b79fd327bcf21f07c4a3a0a30247afd9f1423d1c3840cdbfef55a8cd0c501768c
-
SSDEEP
12288:sMroy9060JjzSUAxzmgvp6c0N6iF5vO5Zl3b:kyV0JjO3ZWN75vOP
Static task
static1
Behavioral task
behavioral1
Sample
f307a90e97f39948643f20a1ca72626ec06ef4c24709dbb3616146be8e8598f4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
f307a90e97f39948643f20a1ca72626ec06ef4c24709dbb3616146be8e8598f4
-
Size
538KB
-
MD5
ae3bad0bcc02c1175277897be996b49b
-
SHA1
41935127ea52426cb028575129033c5aafc5b2b0
-
SHA256
f307a90e97f39948643f20a1ca72626ec06ef4c24709dbb3616146be8e8598f4
-
SHA512
277038a562306b678276c9f8c3f6e8bd0a8a89436285dcee71667fc40185928b79fd327bcf21f07c4a3a0a30247afd9f1423d1c3840cdbfef55a8cd0c501768c
-
SSDEEP
12288:sMroy9060JjzSUAxzmgvp6c0N6iF5vO5Zl3b:kyV0JjO3ZWN75vOP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1