General
-
Target
c05aac5c16a624013f30cdbf5ae99e398d6f57d62457ec1e8463c42ec3df4489.exe
-
Size
850KB
-
Sample
241110-zzbbbaveqq
-
MD5
68f7673c3394598f4e12f5b4d1228015
-
SHA1
9e35755037930fed0a36e7fc5c38a2a1db6662e7
-
SHA256
c05aac5c16a624013f30cdbf5ae99e398d6f57d62457ec1e8463c42ec3df4489
-
SHA512
fbddf866d21e01e7411d65b3dc888c831ce1a8e5d3b5aa38586124adafbe3bccb8c5169ac850c1e2d888d7ce9fea6512a44f30138f97ff684c4e9b317c9a71b0
-
SSDEEP
24576:VyETvlv41UoHplFVpg2jn6vYLaC5WkW/I:wEjlezhV0vYLh50g
Static task
static1
Behavioral task
behavioral1
Sample
c05aac5c16a624013f30cdbf5ae99e398d6f57d62457ec1e8463c42ec3df4489.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
c05aac5c16a624013f30cdbf5ae99e398d6f57d62457ec1e8463c42ec3df4489.exe
-
Size
850KB
-
MD5
68f7673c3394598f4e12f5b4d1228015
-
SHA1
9e35755037930fed0a36e7fc5c38a2a1db6662e7
-
SHA256
c05aac5c16a624013f30cdbf5ae99e398d6f57d62457ec1e8463c42ec3df4489
-
SHA512
fbddf866d21e01e7411d65b3dc888c831ce1a8e5d3b5aa38586124adafbe3bccb8c5169ac850c1e2d888d7ce9fea6512a44f30138f97ff684c4e9b317c9a71b0
-
SSDEEP
24576:VyETvlv41UoHplFVpg2jn6vYLaC5WkW/I:wEjlezhV0vYLh50g
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1