General
-
Target
4b6bab5483acddc35ecbfdbbfa4a717f392149865848fd6187d4c247634811bb.exe
-
Size
385KB
-
Sample
241119-gqqqja1khz
-
MD5
fb37aff5e225eab2b377a5835b7c6c37
-
SHA1
891b0f44d11a367bad11512b10aefa2a0d383e0c
-
SHA256
4b6bab5483acddc35ecbfdbbfa4a717f392149865848fd6187d4c247634811bb
-
SHA512
cd6b90d258577efbb46511a82129b3c7ef3ad403acbe6057c422239faa1a9bb86e423339129cc416c354660641fda2a83baa39bc7cc3b282022d128deafafbdd
-
SSDEEP
6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8o7:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQCg
Static task
static1
Behavioral task
behavioral1
Sample
4b6bab5483acddc35ecbfdbbfa4a717f392149865848fd6187d4c247634811bb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
4b6bab5483acddc35ecbfdbbfa4a717f392149865848fd6187d4c247634811bb.exe
-
Size
385KB
-
MD5
fb37aff5e225eab2b377a5835b7c6c37
-
SHA1
891b0f44d11a367bad11512b10aefa2a0d383e0c
-
SHA256
4b6bab5483acddc35ecbfdbbfa4a717f392149865848fd6187d4c247634811bb
-
SHA512
cd6b90d258577efbb46511a82129b3c7ef3ad403acbe6057c422239faa1a9bb86e423339129cc416c354660641fda2a83baa39bc7cc3b282022d128deafafbdd
-
SSDEEP
6144:KPy+bnr+Dp0yN90QEphcOWDWHm0snFyA55kiJDl5ZY3ZZReRKZMXGER3LXPui8o7:9Mr3y90GO1Hm0SVNjEJZ4RNXG4L/uQCg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1