General
-
Target
e7f5b79374992dd63491a09aae390986f9c16b3be30c7a1fc3f4fe1f55895ebaN.exe
-
Size
412KB
-
Sample
241119-r1smzsxjcz
-
MD5
71754d8a4fc95e35898b1b5bfe82acd0
-
SHA1
fd95ee9689c23d49c1811b305891fc0a5270380f
-
SHA256
e7f5b79374992dd63491a09aae390986f9c16b3be30c7a1fc3f4fe1f55895eba
-
SHA512
1ded9e69625268f1837321318b940e5625af2a3c1697a57ad1c3dc29f755870f54e7a3faa1d1eb96f6d24c8f17af4f551aa07026109bba32e9b05c3a71fbad72
-
SSDEEP
6144:KJy+bnr+Cp0yN90QETLdkmMwbPygrCbjPUSwfr53ljGaG2m9I9+qa/:bMrGy90Iml6gra3wf1ljGaG2zUV/
Static task
static1
Behavioral task
behavioral1
Sample
e7f5b79374992dd63491a09aae390986f9c16b3be30c7a1fc3f4fe1f55895ebaN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
e7f5b79374992dd63491a09aae390986f9c16b3be30c7a1fc3f4fe1f55895ebaN.exe
-
Size
412KB
-
MD5
71754d8a4fc95e35898b1b5bfe82acd0
-
SHA1
fd95ee9689c23d49c1811b305891fc0a5270380f
-
SHA256
e7f5b79374992dd63491a09aae390986f9c16b3be30c7a1fc3f4fe1f55895eba
-
SHA512
1ded9e69625268f1837321318b940e5625af2a3c1697a57ad1c3dc29f755870f54e7a3faa1d1eb96f6d24c8f17af4f551aa07026109bba32e9b05c3a71fbad72
-
SSDEEP
6144:KJy+bnr+Cp0yN90QETLdkmMwbPygrCbjPUSwfr53ljGaG2m9I9+qa/:bMrGy90Iml6gra3wf1ljGaG2zUV/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1