General
-
Target
c8c90bee65fb93b322b3faeef2fc60a76d347239ea114646e5bcbb7f221e21db
-
Size
846KB
-
Sample
241115-cmd54szqhj
-
MD5
f2da802af072c8e4e03e11a374762a97
-
SHA1
016dba25ba4bbbcf2775d4486b869246bec742db
-
SHA256
c8c90bee65fb93b322b3faeef2fc60a76d347239ea114646e5bcbb7f221e21db
-
SHA512
c1c846a43ff57f9b8551d77a050144a2e04a3bb878937ce4713363223ee43119b1244a34f064023290cc93e7ff1a08d92153358fd6b1b003ef18d8c596c60efc
-
SSDEEP
24576:6yDX/1dtGwba7iRHNWdj0b6rPm2qAMdlt9S:BDXBIiRHNF6Crvt
Static task
static1
Behavioral task
behavioral1
Sample
c8c90bee65fb93b322b3faeef2fc60a76d347239ea114646e5bcbb7f221e21db.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Targets
-
-
Target
c8c90bee65fb93b322b3faeef2fc60a76d347239ea114646e5bcbb7f221e21db
-
Size
846KB
-
MD5
f2da802af072c8e4e03e11a374762a97
-
SHA1
016dba25ba4bbbcf2775d4486b869246bec742db
-
SHA256
c8c90bee65fb93b322b3faeef2fc60a76d347239ea114646e5bcbb7f221e21db
-
SHA512
c1c846a43ff57f9b8551d77a050144a2e04a3bb878937ce4713363223ee43119b1244a34f064023290cc93e7ff1a08d92153358fd6b1b003ef18d8c596c60efc
-
SSDEEP
24576:6yDX/1dtGwba7iRHNWdj0b6rPm2qAMdlt9S:BDXBIiRHNF6Crvt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1