General
-
Target
cc015e6e2a3d9e5b39c6cf5f110e060829b26a3f48b190682d16ef221cca1a0c
-
Size
504KB
-
Sample
230815-ey23esaf9y
-
MD5
088f8335b9c7f31a7ec17cb8be4b6dbb
-
SHA1
fc6aecd0d39c055a6b94e387e366c5d26f10bb31
-
SHA256
cc015e6e2a3d9e5b39c6cf5f110e060829b26a3f48b190682d16ef221cca1a0c
-
SHA512
d3962af4ebe4b8438fd8ac8118eba32506540c942f46d15c5246267fb5ebce0cb5c8ff697a0b0a8688209e1487c01543328d9929734aaff09966c97891a7be72
-
SSDEEP
12288:fMrXy90eMqrp/5xQ6CZgizyP5fy0SyTrz6gXiqUQw23IdwxtAP:0yX9rza6QnyP5fy0jrTi/QrfK
Static task
static1
Behavioral task
behavioral1
Sample
cc015e6e2a3d9e5b39c6cf5f110e060829b26a3f48b190682d16ef221cca1a0c.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
meson
77.91.124.54:19071
-
auth_value
47ca57ebe5c142c9ad4650f71bf57877
Targets
-
-
Target
cc015e6e2a3d9e5b39c6cf5f110e060829b26a3f48b190682d16ef221cca1a0c
-
Size
504KB
-
MD5
088f8335b9c7f31a7ec17cb8be4b6dbb
-
SHA1
fc6aecd0d39c055a6b94e387e366c5d26f10bb31
-
SHA256
cc015e6e2a3d9e5b39c6cf5f110e060829b26a3f48b190682d16ef221cca1a0c
-
SHA512
d3962af4ebe4b8438fd8ac8118eba32506540c942f46d15c5246267fb5ebce0cb5c8ff697a0b0a8688209e1487c01543328d9929734aaff09966c97891a7be72
-
SSDEEP
12288:fMrXy90eMqrp/5xQ6CZgizyP5fy0SyTrz6gXiqUQw23IdwxtAP:0yX9rza6QnyP5fy0jrTi/QrfK
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1