General
-
Target
866b774009508591a9599f63236282a4ea59d0cdfcf228263b87966c15881ff7
-
Size
551KB
-
Sample
241111-cype8azhrn
-
MD5
e9741853c4d8917421aadfa411777693
-
SHA1
056ba2984845e444f5dcac82cf87a7cedaae7bd7
-
SHA256
866b774009508591a9599f63236282a4ea59d0cdfcf228263b87966c15881ff7
-
SHA512
0b5a3a6d317d1d79eba4fbd315737d07c5690192b643239d497688c55e658c7b0ca3e935a4cb9fd6c015498c9fccfc2a93bb2459b25f72df798fbdad0ca0d5c0
-
SSDEEP
12288:JMr2y90ybx5XghVQJ0+gBKw+9HQlTXkLJfuInD5QfW6wh/KT/:DyZx5XMVu0+2L+VQlTc5bFhSb
Static task
static1
Behavioral task
behavioral1
Sample
866b774009508591a9599f63236282a4ea59d0cdfcf228263b87966c15881ff7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
866b774009508591a9599f63236282a4ea59d0cdfcf228263b87966c15881ff7
-
Size
551KB
-
MD5
e9741853c4d8917421aadfa411777693
-
SHA1
056ba2984845e444f5dcac82cf87a7cedaae7bd7
-
SHA256
866b774009508591a9599f63236282a4ea59d0cdfcf228263b87966c15881ff7
-
SHA512
0b5a3a6d317d1d79eba4fbd315737d07c5690192b643239d497688c55e658c7b0ca3e935a4cb9fd6c015498c9fccfc2a93bb2459b25f72df798fbdad0ca0d5c0
-
SSDEEP
12288:JMr2y90ybx5XghVQJ0+gBKw+9HQlTXkLJfuInD5QfW6wh/KT/:DyZx5XMVu0+2L+VQlTc5bFhSb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1