General
-
Target
a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d.exe
-
Size
366KB
-
Sample
241112-1ezc3ssanp
-
MD5
4f638f3a3b80a8a1edaa6e48da09403a
-
SHA1
46e29ac6af6c1b8d69856d95639194bb5698750a
-
SHA256
a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d
-
SHA512
174dc415e7bee36f0886dd713027722871de3c3da82d4c1c906d35712d2e2f76b669c066b47a97b81d910bb05edd2d382cabd2b7ce17230f46d160c2bc5b2cff
-
SSDEEP
6144:KXy+bnr+pp0yN90QES5EtlkjZHluB4M/iCDT8w+eb+aEHCZm8aCkQivN9f:dMrFy90hQjGF/L3pZWrxPf
Static task
static1
Behavioral task
behavioral1
Sample
a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d.exe
-
Size
366KB
-
MD5
4f638f3a3b80a8a1edaa6e48da09403a
-
SHA1
46e29ac6af6c1b8d69856d95639194bb5698750a
-
SHA256
a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d
-
SHA512
174dc415e7bee36f0886dd713027722871de3c3da82d4c1c906d35712d2e2f76b669c066b47a97b81d910bb05edd2d382cabd2b7ce17230f46d160c2bc5b2cff
-
SSDEEP
6144:KXy+bnr+pp0yN90QES5EtlkjZHluB4M/iCDT8w+eb+aEHCZm8aCkQivN9f:dMrFy90hQjGF/L3pZWrxPf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1