General
-
Target
f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885
-
Size
202KB
-
Sample
241112-fffxxavhne
-
MD5
857e08a32f132e82fe3e0b21cdf50780
-
SHA1
f3a8b111811aeb6e2d4ec8e5b41094d695c9ca2b
-
SHA256
f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885
-
SHA512
f874906e23468ca89dd8b3996d9ad1103459fc23745e698a48c7729498e502b0379d8586505494c37cbabdb6ddc42c9e39d01aaaf79221cab0a56ea8666e74ea
-
SSDEEP
3072:KNy+bnr+O1d5GWp1icKAArDZz4N9GhbkrNEk6QfA7jkFF9j5dBKOqlY1:KNy+bnr+yp0yN90QEyfAHsF3l
Static task
static1
Behavioral task
behavioral1
Sample
f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885
-
Size
202KB
-
MD5
857e08a32f132e82fe3e0b21cdf50780
-
SHA1
f3a8b111811aeb6e2d4ec8e5b41094d695c9ca2b
-
SHA256
f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885
-
SHA512
f874906e23468ca89dd8b3996d9ad1103459fc23745e698a48c7729498e502b0379d8586505494c37cbabdb6ddc42c9e39d01aaaf79221cab0a56ea8666e74ea
-
SSDEEP
3072:KNy+bnr+O1d5GWp1icKAArDZz4N9GhbkrNEk6QfA7jkFF9j5dBKOqlY1:KNy+bnr+yp0yN90QEyfAHsF3l
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1