General
-
Target
fe0a9db8b4ea0ef9ea1024a6a14d97adf17c1fb355eddeaa37809d5c50cb7d50
-
Size
538KB
-
Sample
250214-rmqlgazlbw
-
MD5
c020f2b5b15d2d54b7465d24ff0cf430
-
SHA1
94416bdc1e2272a79b78fe383aade2ad3a94dac0
-
SHA256
fe0a9db8b4ea0ef9ea1024a6a14d97adf17c1fb355eddeaa37809d5c50cb7d50
-
SHA512
d1992aeb5e846d8eff47f41c04d6b4b49370a24da707d63a2d83cd63f2cbd7abea7a0f50190b5d0e8d765fac428af66242894f9fded893b908c3656156e0ba06
-
SSDEEP
12288:SMr7y90iMjsVuE9Q5cdvPC1Z3dsgydt3PzfKUSAza92qnBM6U:hyWoVxQ5uvPC1dHydt3eoz+9U
Static task
static1
Behavioral task
behavioral1
Sample
fe0a9db8b4ea0ef9ea1024a6a14d97adf17c1fb355eddeaa37809d5c50cb7d50.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
fe0a9db8b4ea0ef9ea1024a6a14d97adf17c1fb355eddeaa37809d5c50cb7d50
-
Size
538KB
-
MD5
c020f2b5b15d2d54b7465d24ff0cf430
-
SHA1
94416bdc1e2272a79b78fe383aade2ad3a94dac0
-
SHA256
fe0a9db8b4ea0ef9ea1024a6a14d97adf17c1fb355eddeaa37809d5c50cb7d50
-
SHA512
d1992aeb5e846d8eff47f41c04d6b4b49370a24da707d63a2d83cd63f2cbd7abea7a0f50190b5d0e8d765fac428af66242894f9fded893b908c3656156e0ba06
-
SSDEEP
12288:SMr7y90iMjsVuE9Q5cdvPC1Z3dsgydt3PzfKUSAza92qnBM6U:hyWoVxQ5uvPC1dHydt3eoz+9U
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4