General
-
Target
162cd3509ff3a3751a23884c277af1996adffbef6f989c357efcbc5445401035.exe
-
Size
380KB
-
Sample
241119-fnsxfa1erp
-
MD5
4f038853c68a66dd8e70d2ae1689e3cd
-
SHA1
af9b166760b6135269d7b8300728439e87e50066
-
SHA256
162cd3509ff3a3751a23884c277af1996adffbef6f989c357efcbc5445401035
-
SHA512
50125ce0133e07b14d2a173ac110d90810bfa8178b366e49b9c215d102f7e86e4c953c42bf1ef59d7008903f8976c2d90e6336eccd6db4d0885df623f30190d7
-
SSDEEP
6144:KCy+bnr+Kp0yN90QEzP6Eka6odUMY59PwAuIroiQ1:6Mr+y904wZSo3iQ1
Static task
static1
Behavioral task
behavioral1
Sample
162cd3509ff3a3751a23884c277af1996adffbef6f989c357efcbc5445401035.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
162cd3509ff3a3751a23884c277af1996adffbef6f989c357efcbc5445401035.exe
-
Size
380KB
-
MD5
4f038853c68a66dd8e70d2ae1689e3cd
-
SHA1
af9b166760b6135269d7b8300728439e87e50066
-
SHA256
162cd3509ff3a3751a23884c277af1996adffbef6f989c357efcbc5445401035
-
SHA512
50125ce0133e07b14d2a173ac110d90810bfa8178b366e49b9c215d102f7e86e4c953c42bf1ef59d7008903f8976c2d90e6336eccd6db4d0885df623f30190d7
-
SSDEEP
6144:KCy+bnr+Kp0yN90QEzP6Eka6odUMY59PwAuIroiQ1:6Mr+y904wZSo3iQ1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1