General
-
Target
c04cf99a3d2122e3ce6972190bdcab2ab4dd6093c9806f41d6ae8fb8ac959c9e
-
Size
500KB
-
Sample
241105-l735eaylez
-
MD5
3d60a8ae8f389228e0275feaa0bd88bb
-
SHA1
a2f1fedb26a29d15168f349c1b774e8d901876a4
-
SHA256
c04cf99a3d2122e3ce6972190bdcab2ab4dd6093c9806f41d6ae8fb8ac959c9e
-
SHA512
199b9637a47be7924b20b531bfc402431ea0db3837a85951234a8c68c7e8c34cbf901f15d42ce3c889c76e9773974ccdb8dc0965ea2746d4b7ae359218191f4f
-
SSDEEP
12288:TMrNy90zVauTxQdJnwIDS8G/SLC61TTPg1:SyeVTT8Vw+Sb61TTPg1
Static task
static1
Behavioral task
behavioral1
Sample
c04cf99a3d2122e3ce6972190bdcab2ab4dd6093c9806f41d6ae8fb8ac959c9e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
c04cf99a3d2122e3ce6972190bdcab2ab4dd6093c9806f41d6ae8fb8ac959c9e
-
Size
500KB
-
MD5
3d60a8ae8f389228e0275feaa0bd88bb
-
SHA1
a2f1fedb26a29d15168f349c1b774e8d901876a4
-
SHA256
c04cf99a3d2122e3ce6972190bdcab2ab4dd6093c9806f41d6ae8fb8ac959c9e
-
SHA512
199b9637a47be7924b20b531bfc402431ea0db3837a85951234a8c68c7e8c34cbf901f15d42ce3c889c76e9773974ccdb8dc0965ea2746d4b7ae359218191f4f
-
SSDEEP
12288:TMrNy90zVauTxQdJnwIDS8G/SLC61TTPg1:SyeVTT8Vw+Sb61TTPg1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1