General
-
Target
357dc2859091de4426e96e07df51e52a5393e7e4ce2f1dde15fb6982e58cd563
-
Size
478KB
-
Sample
241106-te14catand
-
MD5
d647076bda047c1d86509362bc09895f
-
SHA1
29e4aa31173b9e36049599a52323b609a9403d69
-
SHA256
357dc2859091de4426e96e07df51e52a5393e7e4ce2f1dde15fb6982e58cd563
-
SHA512
86e1f874190bfb92c8d2649662485e2a5605dc525329c58a4adb0c985ab45ec785d31dacf4e56d837ff4276b94bbdd0ba7c551eb16b48558341c18c994736ab1
-
SSDEEP
12288:sMrAy90hTAalYH/Sesw7e2Vhd7KcKdXQ9danS2T:cyg8zZLddK50anPT
Static task
static1
Behavioral task
behavioral1
Sample
357dc2859091de4426e96e07df51e52a5393e7e4ce2f1dde15fb6982e58cd563.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
357dc2859091de4426e96e07df51e52a5393e7e4ce2f1dde15fb6982e58cd563
-
Size
478KB
-
MD5
d647076bda047c1d86509362bc09895f
-
SHA1
29e4aa31173b9e36049599a52323b609a9403d69
-
SHA256
357dc2859091de4426e96e07df51e52a5393e7e4ce2f1dde15fb6982e58cd563
-
SHA512
86e1f874190bfb92c8d2649662485e2a5605dc525329c58a4adb0c985ab45ec785d31dacf4e56d837ff4276b94bbdd0ba7c551eb16b48558341c18c994736ab1
-
SSDEEP
12288:sMrAy90hTAalYH/Sesw7e2Vhd7KcKdXQ9danS2T:cyg8zZLddK50anPT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1