General
-
Target
601b35b2f6fff1d6135e4e26f2db28a090d0d9c77229bd9960882392d13d3435
-
Size
666KB
-
Sample
241105-11fsvszblh
-
MD5
94614fce4a4482a954a1b9374fa73f95
-
SHA1
bb88891be4d4bce9dccb2da1581697cda1e0150e
-
SHA256
601b35b2f6fff1d6135e4e26f2db28a090d0d9c77229bd9960882392d13d3435
-
SHA512
6d58185fabad05412ac260563533f86dc8dfe6cc6f4941f6399efd72a9e78b310015af3f40dc31f3abb9693ed9f53124b4c3cdcc542b8e27cb511e0aa42b274b
-
SSDEEP
12288:IMrIy90uQmykW/1MorONCGlD2m7mKEB4b2D90rUuLE/wWHEW2Kq2:gyomLoGCGMfKEB4g0rLSwWHah2
Static task
static1
Behavioral task
behavioral1
Sample
601b35b2f6fff1d6135e4e26f2db28a090d0d9c77229bd9960882392d13d3435.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
601b35b2f6fff1d6135e4e26f2db28a090d0d9c77229bd9960882392d13d3435
-
Size
666KB
-
MD5
94614fce4a4482a954a1b9374fa73f95
-
SHA1
bb88891be4d4bce9dccb2da1581697cda1e0150e
-
SHA256
601b35b2f6fff1d6135e4e26f2db28a090d0d9c77229bd9960882392d13d3435
-
SHA512
6d58185fabad05412ac260563533f86dc8dfe6cc6f4941f6399efd72a9e78b310015af3f40dc31f3abb9693ed9f53124b4c3cdcc542b8e27cb511e0aa42b274b
-
SSDEEP
12288:IMrIy90uQmykW/1MorONCGlD2m7mKEB4b2D90rUuLE/wWHEW2Kq2:gyomLoGCGMfKEB4g0rLSwWHah2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1