General
-
Target
69f8e43073e849bba9e3092888fe246fa19fe53188b6554d23f63834b9b19690N
-
Size
202KB
-
Sample
241114-lefteawhrb
-
MD5
b4d19e1899fad64b988f6f917ac62c80
-
SHA1
85159974fed63fe8e0f9308b13a8628605456382
-
SHA256
69f8e43073e849bba9e3092888fe246fa19fe53188b6554d23f63834b9b19690
-
SHA512
66a9c644c05ae3cf64d31608699a57bfda819aac016e49dd66748a175455935a9b021238794acb624a99a38596f1043adf1c072f950c427db3b96e643225a438
-
SSDEEP
3072:Kly+bnr+O145GWp1icKAArDZz4N9GhbkrNEk6IfA7jkFF9j5dBKO3lY1:Kly+bnr+Dp0yN90QEufAHsF3M
Static task
static1
Behavioral task
behavioral1
Sample
69f8e43073e849bba9e3092888fe246fa19fe53188b6554d23f63834b9b19690N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
69f8e43073e849bba9e3092888fe246fa19fe53188b6554d23f63834b9b19690N
-
Size
202KB
-
MD5
b4d19e1899fad64b988f6f917ac62c80
-
SHA1
85159974fed63fe8e0f9308b13a8628605456382
-
SHA256
69f8e43073e849bba9e3092888fe246fa19fe53188b6554d23f63834b9b19690
-
SHA512
66a9c644c05ae3cf64d31608699a57bfda819aac016e49dd66748a175455935a9b021238794acb624a99a38596f1043adf1c072f950c427db3b96e643225a438
-
SSDEEP
3072:Kly+bnr+O145GWp1icKAArDZz4N9GhbkrNEk6IfA7jkFF9j5dBKO3lY1:Kly+bnr+Dp0yN90QEufAHsF3M
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1