General
-
Target
d57656d24cf6000e3ce7fa4309e31d86c03c4af3d251593b4a8fc3fbe54fb0d5
-
Size
1.5MB
-
Sample
241110-xsap4ashkj
-
MD5
35685d5d153b39fc65cff494682bbdde
-
SHA1
3aec5d9a4ec981298bbcefa80633943c1c8f8760
-
SHA256
d57656d24cf6000e3ce7fa4309e31d86c03c4af3d251593b4a8fc3fbe54fb0d5
-
SHA512
66f5ea1e37d7fd415ee908e85bf7ff9ac5a9d9f86ea2ce3f288d52734ad0954edb88bb844476861dcedd735d07161fc69d823c07e81d77f82934ecbaa98c22d3
-
SSDEEP
49152:uHETxasA6L3LSzOKOV4UUa4U5lW+1/u4Jkmi84hRu:e2xR3W0+aV50KzvkhR
Static task
static1
Behavioral task
behavioral1
Sample
d57656d24cf6000e3ce7fa4309e31d86c03c4af3d251593b4a8fc3fbe54fb0d5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Targets
-
-
Target
d57656d24cf6000e3ce7fa4309e31d86c03c4af3d251593b4a8fc3fbe54fb0d5
-
Size
1.5MB
-
MD5
35685d5d153b39fc65cff494682bbdde
-
SHA1
3aec5d9a4ec981298bbcefa80633943c1c8f8760
-
SHA256
d57656d24cf6000e3ce7fa4309e31d86c03c4af3d251593b4a8fc3fbe54fb0d5
-
SHA512
66f5ea1e37d7fd415ee908e85bf7ff9ac5a9d9f86ea2ce3f288d52734ad0954edb88bb844476861dcedd735d07161fc69d823c07e81d77f82934ecbaa98c22d3
-
SSDEEP
49152:uHETxasA6L3LSzOKOV4UUa4U5lW+1/u4Jkmi84hRu:e2xR3W0+aV50KzvkhR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1