General
-
Target
332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7N.exe
-
Size
385KB
-
Sample
241119-fc9qta1ejk
-
MD5
dbf8cb92fe5004fab5a6ea4118492e80
-
SHA1
838dcc5d833baae4b85195370602245a2eb95fe2
-
SHA256
332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7
-
SHA512
0b75c8ffcc028d9cc9617aaba0d2bcbf4492ce7ea07c447427d44e98d47a8a2df5a7177d11a2d1e68f5ec0e976f367bff0dd3f6888023ef6601da299c9f8b5cc
-
SSDEEP
6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8om:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQC
Static task
static1
Behavioral task
behavioral1
Sample
332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7N.exe
-
Size
385KB
-
MD5
dbf8cb92fe5004fab5a6ea4118492e80
-
SHA1
838dcc5d833baae4b85195370602245a2eb95fe2
-
SHA256
332a7737dffa5469150cc97dd711a3350bf102ac64a5d42930272eb2bdee5ac7
-
SHA512
0b75c8ffcc028d9cc9617aaba0d2bcbf4492ce7ea07c447427d44e98d47a8a2df5a7177d11a2d1e68f5ec0e976f367bff0dd3f6888023ef6601da299c9f8b5cc
-
SSDEEP
6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8om:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1