General
-
Target
caa065f9fd7f3ce5e0bf0c40f0cb1aa59e4e671d91b23a40f8905d604325cc98
-
Size
478KB
-
Sample
241107-g69tcaxfrq
-
MD5
4d72634ba644e97558011895e933656b
-
SHA1
0297f46293b64341f4d28b9f4f736a73f4318eca
-
SHA256
caa065f9fd7f3ce5e0bf0c40f0cb1aa59e4e671d91b23a40f8905d604325cc98
-
SHA512
a6640909dae611f1f854cc8c5ae9177af76fb2089e8fff9aba0f03e6dfa5ffdaea4d3bd445d77cf059a0751966cbfe7fc49387b00a9f36ae55c6d2f5a0946138
-
SSDEEP
12288:dMrsy90LgLwB+W9mpx12vUj4CKRmOQ+cXa9TR:5ytLI+W9mpjbNKAXtKTR
Static task
static1
Behavioral task
behavioral1
Sample
caa065f9fd7f3ce5e0bf0c40f0cb1aa59e4e671d91b23a40f8905d604325cc98.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
caa065f9fd7f3ce5e0bf0c40f0cb1aa59e4e671d91b23a40f8905d604325cc98
-
Size
478KB
-
MD5
4d72634ba644e97558011895e933656b
-
SHA1
0297f46293b64341f4d28b9f4f736a73f4318eca
-
SHA256
caa065f9fd7f3ce5e0bf0c40f0cb1aa59e4e671d91b23a40f8905d604325cc98
-
SHA512
a6640909dae611f1f854cc8c5ae9177af76fb2089e8fff9aba0f03e6dfa5ffdaea4d3bd445d77cf059a0751966cbfe7fc49387b00a9f36ae55c6d2f5a0946138
-
SSDEEP
12288:dMrsy90LgLwB+W9mpx12vUj4CKRmOQ+cXa9TR:5ytLI+W9mpjbNKAXtKTR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1