General
-
Target
fb05507c52c2e8f629b69a34d84727ea4642260cec6c837d5c5e06d66768868a
-
Size
765KB
-
Sample
241111-cyek1stnhk
-
MD5
b2df5dec575c31441f14b4764b9158da
-
SHA1
d8ac94de573c64a6190f0519a629ae67b60f11bb
-
SHA256
fb05507c52c2e8f629b69a34d84727ea4642260cec6c837d5c5e06d66768868a
-
SHA512
36dba110cf53ed6ca6f496c8ce9dcaf366291997cc34dc62bdac6f0628e6f2aacc02871ecf1be05276dccd5bd21c49e8987c2a8eb4e219ae3f590fa41b3eeec9
-
SSDEEP
12288:+MrVy90ZgLLpmVfgeTwe6oTYHU2hl0NJvLS9slp1Ws/rrRWyfF7EpeyMsi/4:zy+gLLgVfNj6oTOU2hsJvLjlpLzX03Mu
Static task
static1
Behavioral task
behavioral1
Sample
fb05507c52c2e8f629b69a34d84727ea4642260cec6c837d5c5e06d66768868a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Targets
-
-
Target
fb05507c52c2e8f629b69a34d84727ea4642260cec6c837d5c5e06d66768868a
-
Size
765KB
-
MD5
b2df5dec575c31441f14b4764b9158da
-
SHA1
d8ac94de573c64a6190f0519a629ae67b60f11bb
-
SHA256
fb05507c52c2e8f629b69a34d84727ea4642260cec6c837d5c5e06d66768868a
-
SHA512
36dba110cf53ed6ca6f496c8ce9dcaf366291997cc34dc62bdac6f0628e6f2aacc02871ecf1be05276dccd5bd21c49e8987c2a8eb4e219ae3f590fa41b3eeec9
-
SSDEEP
12288:+MrVy90ZgLLpmVfgeTwe6oTYHU2hl0NJvLS9slp1Ws/rrRWyfF7EpeyMsi/4:zy+gLLgVfNj6oTOU2hsJvLjlpLzX03Mu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1