General
-
Target
40affe9c9bcd35385304d0990930992859cc2ea2887bfba032181770f9f67404
-
Size
481KB
-
Sample
241111-ja9vkswcrd
-
MD5
18c3c9c0f30ff9e15e98ed6c0b8b94c2
-
SHA1
bda7d3f97eb6f33f7c8e5c634e6e11ae3276bc61
-
SHA256
40affe9c9bcd35385304d0990930992859cc2ea2887bfba032181770f9f67404
-
SHA512
0df42c1105ce791a3ac6d403450de4a87f4bd9b653a7159a8e871bca68e0f816a97e2d9c37c27c97224ba8c8efac620f87373e2def144a5fcfe2c59551b1420e
-
SSDEEP
6144:KJy+bnr+Vp0yN90QE/OxuSmd1qWcq9kVTDtpR/U0G5Zk1AUVkoqOzpe+bcOrCBkp:nMrJy90JOxuh1VspRZ1AUTqSs+qBkp
Static task
static1
Behavioral task
behavioral1
Sample
40affe9c9bcd35385304d0990930992859cc2ea2887bfba032181770f9f67404.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
40affe9c9bcd35385304d0990930992859cc2ea2887bfba032181770f9f67404
-
Size
481KB
-
MD5
18c3c9c0f30ff9e15e98ed6c0b8b94c2
-
SHA1
bda7d3f97eb6f33f7c8e5c634e6e11ae3276bc61
-
SHA256
40affe9c9bcd35385304d0990930992859cc2ea2887bfba032181770f9f67404
-
SHA512
0df42c1105ce791a3ac6d403450de4a87f4bd9b653a7159a8e871bca68e0f816a97e2d9c37c27c97224ba8c8efac620f87373e2def144a5fcfe2c59551b1420e
-
SSDEEP
6144:KJy+bnr+Vp0yN90QE/OxuSmd1qWcq9kVTDtpR/U0G5Zk1AUVkoqOzpe+bcOrCBkp:nMrJy90JOxuh1VspRZ1AUTqSs+qBkp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1