General
-
Target
c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd
-
Size
500KB
-
Sample
241109-q6q6nswalg
-
MD5
0489cfcb3da1d28b0b664d1e258fe859
-
SHA1
e21fbb31da1563c18ca1586f4a209daf8ea8f00f
-
SHA256
c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd
-
SHA512
a8eb785cd0e390e6c09ff2340533a79a5a8946625e5ded215f4f35d5de8b3b418133d646766e3f569837a214018c02934381873edcb921d0e55fb348aea8d349
-
SSDEEP
12288:oMrmy90068IOMiuB/yoJfW/niZcgw5nYP6+/:OymyMlTJfW/IPOr+/
Static task
static1
Behavioral task
behavioral1
Sample
c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd
-
Size
500KB
-
MD5
0489cfcb3da1d28b0b664d1e258fe859
-
SHA1
e21fbb31da1563c18ca1586f4a209daf8ea8f00f
-
SHA256
c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd
-
SHA512
a8eb785cd0e390e6c09ff2340533a79a5a8946625e5ded215f4f35d5de8b3b418133d646766e3f569837a214018c02934381873edcb921d0e55fb348aea8d349
-
SSDEEP
12288:oMrmy90068IOMiuB/yoJfW/niZcgw5nYP6+/:OymyMlTJfW/IPOr+/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1