General
-
Target
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6
-
Size
561KB
-
Sample
241104-qw89hasrel
-
MD5
8bcc5a3531f885b7c4cd21afd5f12448
-
SHA1
99196e16b9abf1143280cc95af57f1682abb6a6c
-
SHA256
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6
-
SHA512
ac2421459334da14d5b4865f339f6dbfc3bbe075566d14c268f6274a8a63d350451df89e90eb8e3da289ed8989bf96b0f6912284d1d63f87bb035d178ba26216
-
SSDEEP
12288:VMrEy90/BwWii2lVlYIjoAE/n2yZk9cAycMeAzxPBhBgrFC:xy2BdN2Lm/n3kStHoFC
Static task
static1
Behavioral task
behavioral1
Sample
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6
-
Size
561KB
-
MD5
8bcc5a3531f885b7c4cd21afd5f12448
-
SHA1
99196e16b9abf1143280cc95af57f1682abb6a6c
-
SHA256
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6
-
SHA512
ac2421459334da14d5b4865f339f6dbfc3bbe075566d14c268f6274a8a63d350451df89e90eb8e3da289ed8989bf96b0f6912284d1d63f87bb035d178ba26216
-
SSDEEP
12288:VMrEy90/BwWii2lVlYIjoAE/n2yZk9cAycMeAzxPBhBgrFC:xy2BdN2Lm/n3kStHoFC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1