General
-
Target
3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08.exe
-
Size
381KB
-
Sample
241118-pevjcawhll
-
MD5
dbf0a44ba1d685e731eb23b39f794dad
-
SHA1
d75f32f47a14be0438d6a1c8bff839d117ec78a2
-
SHA256
3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08
-
SHA512
9c7d4429abf66456ddffc77075361d26783971340da9384fd72746a05435ec2c767691f87d5f5132dc33d70d83da6b8db3689ccd9a093a3d2f333bbf9b84f1f4
-
SSDEEP
6144:KEy+bnr+Vp0yN90QEyExRxzI5kv+NXBYC4wkMuZ7OPhL5c4GKEi51xwBv:IMrRy908ExRBpGNXSJMu0Z1TGKEi5fwN
Static task
static1
Behavioral task
behavioral1
Sample
3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08.exe
-
Size
381KB
-
MD5
dbf0a44ba1d685e731eb23b39f794dad
-
SHA1
d75f32f47a14be0438d6a1c8bff839d117ec78a2
-
SHA256
3e748ff735d10a8aa5e0a6c8925d2852a3173df3d8beb1d5d422ea7f9f8eeb08
-
SHA512
9c7d4429abf66456ddffc77075361d26783971340da9384fd72746a05435ec2c767691f87d5f5132dc33d70d83da6b8db3689ccd9a093a3d2f333bbf9b84f1f4
-
SSDEEP
6144:KEy+bnr+Vp0yN90QEyExRxzI5kv+NXBYC4wkMuZ7OPhL5c4GKEi51xwBv:IMrRy908ExRBpGNXSJMu0Z1TGKEi5fwN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1