General
-
Target
59fca5bad71daf43a724c7f015613ad86647646580e13ec10f3ca1a22c48f8be
-
Size
717KB
-
Sample
241111-c49nca1bmq
-
MD5
c0b8949863635c2fb4f37cba63affb2d
-
SHA1
0e07c7a047618f936c3553ee69065feaaee9a840
-
SHA256
59fca5bad71daf43a724c7f015613ad86647646580e13ec10f3ca1a22c48f8be
-
SHA512
733a814e2b07edd15bde921bfad33bfd3b63549d35ea2bb9dbef9e9c7d3a818cf48922e7fe020a491444d15f530af424fc596fda099aa0f10bfc2bbbfd611571
-
SSDEEP
12288:eMrKy90+Gwj6AC/leMgG+7PMjc0t6NN5ol2D8qBCaz6h0cKjci:EyWirC/tapu6NDolCfBC9PI
Static task
static1
Behavioral task
behavioral1
Sample
59fca5bad71daf43a724c7f015613ad86647646580e13ec10f3ca1a22c48f8be.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
59fca5bad71daf43a724c7f015613ad86647646580e13ec10f3ca1a22c48f8be
-
Size
717KB
-
MD5
c0b8949863635c2fb4f37cba63affb2d
-
SHA1
0e07c7a047618f936c3553ee69065feaaee9a840
-
SHA256
59fca5bad71daf43a724c7f015613ad86647646580e13ec10f3ca1a22c48f8be
-
SHA512
733a814e2b07edd15bde921bfad33bfd3b63549d35ea2bb9dbef9e9c7d3a818cf48922e7fe020a491444d15f530af424fc596fda099aa0f10bfc2bbbfd611571
-
SSDEEP
12288:eMrKy90+Gwj6AC/leMgG+7PMjc0t6NN5ol2D8qBCaz6h0cKjci:EyWirC/tapu6NDolCfBC9PI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1