General
-
Target
e13f563f0900c818dd558d27dccbce5b31ce5b72e3e5f0e79579a6406488e784
-
Size
526KB
-
Sample
241111-cznkbazmdx
-
MD5
05acd6a0f46ce40203e808c4e9dff72f
-
SHA1
01fd2d56bb1cc4bf5ed869f502b9213a5433e5e1
-
SHA256
e13f563f0900c818dd558d27dccbce5b31ce5b72e3e5f0e79579a6406488e784
-
SHA512
b1a50c450b0c658a977d77abc51f1a6477f7bbeca58bc10da688ebfc5a3b837094d775fe05a06f1d0690a15e59a4469718e960695c05f0beb3a090561f028a03
-
SSDEEP
12288:BMrBy90n1s8PWYmOJCjlh5D7eJi+2lVkW0URRU:cy+1PPW7njljDp9U
Static task
static1
Behavioral task
behavioral1
Sample
e13f563f0900c818dd558d27dccbce5b31ce5b72e3e5f0e79579a6406488e784.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
e13f563f0900c818dd558d27dccbce5b31ce5b72e3e5f0e79579a6406488e784
-
Size
526KB
-
MD5
05acd6a0f46ce40203e808c4e9dff72f
-
SHA1
01fd2d56bb1cc4bf5ed869f502b9213a5433e5e1
-
SHA256
e13f563f0900c818dd558d27dccbce5b31ce5b72e3e5f0e79579a6406488e784
-
SHA512
b1a50c450b0c658a977d77abc51f1a6477f7bbeca58bc10da688ebfc5a3b837094d775fe05a06f1d0690a15e59a4469718e960695c05f0beb3a090561f028a03
-
SSDEEP
12288:BMrBy90n1s8PWYmOJCjlh5D7eJi+2lVkW0URRU:cy+1PPW7njljDp9U
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1