General
-
Target
521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400
-
Size
661KB
-
Sample
241104-razcvaznbx
-
MD5
767d4c1d5269b4e207a810f371c4400c
-
SHA1
99fd718c8fe9b3b9c990db213af2e7f00b6a436d
-
SHA256
521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400
-
SHA512
c6f746a35ea6349227fb8354677a6b46680477e53c5d8b90f25d5a00d00c10f4a1e408ebf3bffd57bc89a920195c81e525b8acc6b657010801659b648d1eb192
-
SSDEEP
12288:XMrny90T/rj2t0msJDp4UDP2CWwdtdZNfeDfEoxwnA3Zb:Yym/oqDp4UThWwRQbh
Static task
static1
Behavioral task
behavioral1
Sample
521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Targets
-
-
Target
521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400
-
Size
661KB
-
MD5
767d4c1d5269b4e207a810f371c4400c
-
SHA1
99fd718c8fe9b3b9c990db213af2e7f00b6a436d
-
SHA256
521edd96b5cefb70c7e6e2b6294c895d6f0b2c992bb2e7e5342f3bc7f3539400
-
SHA512
c6f746a35ea6349227fb8354677a6b46680477e53c5d8b90f25d5a00d00c10f4a1e408ebf3bffd57bc89a920195c81e525b8acc6b657010801659b648d1eb192
-
SSDEEP
12288:XMrny90T/rj2t0msJDp4UDP2CWwdtdZNfeDfEoxwnA3Zb:Yym/oqDp4UThWwRQbh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1