General
-
Target
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1
-
Size
666KB
-
Sample
240304-ckskqafh45
-
MD5
784f68b99ad3a7a73f3b691ffa4d2b62
-
SHA1
94bca74ae43c1b36328740749cf363fdffaa6997
-
SHA256
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1
-
SHA512
4e29de01ab83ddd9dc674f3d8ec211a4ad4c3334a73362a956e91d2a800ce160755f2bf1c6147a534510d7905efb12c825bfb5df681adf4eea3efd185f3883a3
-
SSDEEP
12288:4Mrgy90+rFnb7XWnPS+LV5it2YZzBoP/uqDznJYw3muv+:4ylnXsPS+LV5iAY8uEn7Y
Static task
static1
Behavioral task
behavioral1
Sample
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1
-
Size
666KB
-
MD5
784f68b99ad3a7a73f3b691ffa4d2b62
-
SHA1
94bca74ae43c1b36328740749cf363fdffaa6997
-
SHA256
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1
-
SHA512
4e29de01ab83ddd9dc674f3d8ec211a4ad4c3334a73362a956e91d2a800ce160755f2bf1c6147a534510d7905efb12c825bfb5df681adf4eea3efd185f3883a3
-
SSDEEP
12288:4Mrgy90+rFnb7XWnPS+LV5it2YZzBoP/uqDznJYw3muv+:4ylnXsPS+LV5iAY8uEn7Y
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1