General
-
Target
b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0aN.exe
-
Size
202KB
-
Sample
241112-t46p5azmck
-
MD5
a7972f4c09af7356641faa69f97c85b0
-
SHA1
876aab27555c4ad64a81be490f7e96bcb95842d1
-
SHA256
b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0a
-
SHA512
b4b59bb10a65a31f4f1b3ecc644d565def83ba7bcd95131427875be1b3f8d2b7b48142ea2ba18b38a45ca10d42493780d1ab190dbf3d9c5ba639cd4532d078de
-
SSDEEP
3072:KFy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk66fA7jkFF9j5dBKOqlY1:KFy+bnr+Hp0yN90QEgfAHsF3x
Static task
static1
Behavioral task
behavioral1
Sample
b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0aN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0aN.exe
-
Size
202KB
-
MD5
a7972f4c09af7356641faa69f97c85b0
-
SHA1
876aab27555c4ad64a81be490f7e96bcb95842d1
-
SHA256
b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0a
-
SHA512
b4b59bb10a65a31f4f1b3ecc644d565def83ba7bcd95131427875be1b3f8d2b7b48142ea2ba18b38a45ca10d42493780d1ab190dbf3d9c5ba639cd4532d078de
-
SSDEEP
3072:KFy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk66fA7jkFF9j5dBKOqlY1:KFy+bnr+Hp0yN90QEgfAHsF3x
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1