General
-
Target
7daf57333ae553a4221c09fd90a9b496783f9c82fb8a8a1b79a959c08efebec5
-
Size
500KB
-
Sample
241107-c6matssnhw
-
MD5
7a42f18195bdfd579eb919d5d04bd052
-
SHA1
af47efea2d22209713a87decdf412d13235e1877
-
SHA256
7daf57333ae553a4221c09fd90a9b496783f9c82fb8a8a1b79a959c08efebec5
-
SHA512
9dac410686e053c56df48c80be59339cdfdc207d128ab5826fbdd879d65a2600a22b41ff7be13d8340481acafc1b41cead2a2ba6b3ed651e86950bffd62a215b
-
SSDEEP
12288:qMrEy90uAI3cI29ugaB47S5TT5/2BprbWy+1B7ua:GyBrWtaB47S5T9OBlay+1Nua
Static task
static1
Behavioral task
behavioral1
Sample
7daf57333ae553a4221c09fd90a9b496783f9c82fb8a8a1b79a959c08efebec5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
7daf57333ae553a4221c09fd90a9b496783f9c82fb8a8a1b79a959c08efebec5
-
Size
500KB
-
MD5
7a42f18195bdfd579eb919d5d04bd052
-
SHA1
af47efea2d22209713a87decdf412d13235e1877
-
SHA256
7daf57333ae553a4221c09fd90a9b496783f9c82fb8a8a1b79a959c08efebec5
-
SHA512
9dac410686e053c56df48c80be59339cdfdc207d128ab5826fbdd879d65a2600a22b41ff7be13d8340481acafc1b41cead2a2ba6b3ed651e86950bffd62a215b
-
SSDEEP
12288:qMrEy90uAI3cI29ugaB47S5TT5/2BprbWy+1B7ua:GyBrWtaB47S5T9OBlay+1Nua
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1