General
-
Target
654f72efa093b904968df5c8794fce3654bf03760b7a60510486e2f54e82cde6N.exe
-
Size
375KB
-
Sample
241118-w1tx9ssgmp
-
MD5
fd43ba2d6be96bbea5cdd012538e0d10
-
SHA1
881b6c3f9df2344727c0e97ead900190685c0507
-
SHA256
654f72efa093b904968df5c8794fce3654bf03760b7a60510486e2f54e82cde6
-
SHA512
76114238ff0f4d966f99d1ebf00fa9cc44c60825c4aed76b7e774f0c13c5ef1e767d7fa884a700f686c10c671d2559b530284a08fa90a1e8dcf801a40031ee14
-
SSDEEP
6144:Kmy+bnr+Up0yN90QEpNA4CWpDj/Ej/FFYCvIenrwlDqorItHLUCseXXcuD:iMroy90bN1CWFsjhz+qorgHACsgXHD
Static task
static1
Behavioral task
behavioral1
Sample
654f72efa093b904968df5c8794fce3654bf03760b7a60510486e2f54e82cde6N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
654f72efa093b904968df5c8794fce3654bf03760b7a60510486e2f54e82cde6N.exe
-
Size
375KB
-
MD5
fd43ba2d6be96bbea5cdd012538e0d10
-
SHA1
881b6c3f9df2344727c0e97ead900190685c0507
-
SHA256
654f72efa093b904968df5c8794fce3654bf03760b7a60510486e2f54e82cde6
-
SHA512
76114238ff0f4d966f99d1ebf00fa9cc44c60825c4aed76b7e774f0c13c5ef1e767d7fa884a700f686c10c671d2559b530284a08fa90a1e8dcf801a40031ee14
-
SSDEEP
6144:Kmy+bnr+Up0yN90QEpNA4CWpDj/Ej/FFYCvIenrwlDqorItHLUCseXXcuD:iMroy90bN1CWFsjhz+qorgHACsgXHD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1