General
-
Target
8e5cb811800ee2e2a3a98f2e6ebcf1dcdac63dc12b9e8672427b253815124e20N.exe
-
Size
533KB
-
Sample
250208-g6h1mazqcs
-
MD5
951a2da5c9f7db6f56d602e82f4d6fb0
-
SHA1
d12096a1480dcdbb230ea743f29c405a680a5509
-
SHA256
8e5cb811800ee2e2a3a98f2e6ebcf1dcdac63dc12b9e8672427b253815124e20
-
SHA512
d96b8f52ebfdbefacc3e19708d825079d6485247e5c97c7acad8fda680435861fb95ba495073b2395b4605dba7345991fb9bce2e6a7dec9988f7c47fb71d81df
-
SSDEEP
12288:+Mrgy90eQLSSwVkXrOiksJwbJ9YbdM7vthdNkEIjOZJUi4T:eyKO7VViksJwbJ9MMTth/kEIyZJdw
Static task
static1
Behavioral task
behavioral1
Sample
8e5cb811800ee2e2a3a98f2e6ebcf1dcdac63dc12b9e8672427b253815124e20N.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
8e5cb811800ee2e2a3a98f2e6ebcf1dcdac63dc12b9e8672427b253815124e20N.exe
-
Size
533KB
-
MD5
951a2da5c9f7db6f56d602e82f4d6fb0
-
SHA1
d12096a1480dcdbb230ea743f29c405a680a5509
-
SHA256
8e5cb811800ee2e2a3a98f2e6ebcf1dcdac63dc12b9e8672427b253815124e20
-
SHA512
d96b8f52ebfdbefacc3e19708d825079d6485247e5c97c7acad8fda680435861fb95ba495073b2395b4605dba7345991fb9bce2e6a7dec9988f7c47fb71d81df
-
SSDEEP
12288:+Mrgy90eQLSSwVkXrOiksJwbJ9YbdM7vthdNkEIjOZJUi4T:eyKO7VViksJwbJ9MMTth/kEIyZJdw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4