General
-
Target
ca5c8bbf1e1678c17cc1781711fc31305c03148e0e58f14db305662540849982
-
Size
1.5MB
-
Sample
241110-szzkkszdpc
-
MD5
8c888f2c5d9c127dd595f80ed4594ff1
-
SHA1
529d1ffa2ef4b9b63982a3edadb791f736330012
-
SHA256
ca5c8bbf1e1678c17cc1781711fc31305c03148e0e58f14db305662540849982
-
SHA512
addf3f7ecea6f5256580d4a8f99b2d3906c320f8b4038bc8de2324c59bf94ce20b9a22a25f2313e07e6642351d3636fbae30365014332de469436135f5fb289e
-
SSDEEP
24576:KyUNyrw8+Z3sD3JrC42Q9a+sR6F54QI/YjeXGfN6dw6bzokNvpRW/kZOa:RUNoWUMQ9qcFHXP6bUkNPW8ZO
Static task
static1
Behavioral task
behavioral1
Sample
ca5c8bbf1e1678c17cc1781711fc31305c03148e0e58f14db305662540849982.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
ca5c8bbf1e1678c17cc1781711fc31305c03148e0e58f14db305662540849982
-
Size
1.5MB
-
MD5
8c888f2c5d9c127dd595f80ed4594ff1
-
SHA1
529d1ffa2ef4b9b63982a3edadb791f736330012
-
SHA256
ca5c8bbf1e1678c17cc1781711fc31305c03148e0e58f14db305662540849982
-
SHA512
addf3f7ecea6f5256580d4a8f99b2d3906c320f8b4038bc8de2324c59bf94ce20b9a22a25f2313e07e6642351d3636fbae30365014332de469436135f5fb289e
-
SSDEEP
24576:KyUNyrw8+Z3sD3JrC42Q9a+sR6F54QI/YjeXGfN6dw6bzokNvpRW/kZOa:RUNoWUMQ9qcFHXP6bUkNPW8ZO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1