General
-
Target
39771ddc1b2fc36def86a62560fe8eec36ae99d65d85bd83b4f9dcc79a3a9c67N.exe
-
Size
501KB
-
Sample
241111-wvlppsslc1
-
MD5
4458f44b2844389a876d967516ba8604
-
SHA1
acbdd14ef1f2390d7895b97d79d3b9371ff42861
-
SHA256
ed5de0588a72f15c9501f4f6bfd2d8c04d4054c14cf31fc07beb399272dd3509
-
SHA512
f81d61be3fa831c216cd23832792bab3762dfd15e9acecb0f66b68b0118e852ad3e9cd56b32803481f211863aa8f889d98afb982b189b9d31f8cccb5866608df
-
SSDEEP
12288:kMrmy90m+gzCNctWsvs1ZXAIFavUrzFJ+rH:qyt+sCNccz1ZXXFFJ+rH
Static task
static1
Behavioral task
behavioral1
Sample
39771ddc1b2fc36def86a62560fe8eec36ae99d65d85bd83b4f9dcc79a3a9c67N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
39771ddc1b2fc36def86a62560fe8eec36ae99d65d85bd83b4f9dcc79a3a9c67N.exe
-
Size
501KB
-
MD5
4458f44b2844389a876d967516ba8604
-
SHA1
acbdd14ef1f2390d7895b97d79d3b9371ff42861
-
SHA256
ed5de0588a72f15c9501f4f6bfd2d8c04d4054c14cf31fc07beb399272dd3509
-
SHA512
f81d61be3fa831c216cd23832792bab3762dfd15e9acecb0f66b68b0118e852ad3e9cd56b32803481f211863aa8f889d98afb982b189b9d31f8cccb5866608df
-
SSDEEP
12288:kMrmy90m+gzCNctWsvs1ZXAIFavUrzFJ+rH:qyt+sCNccz1ZXXFFJ+rH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1