General
-
Target
c64c7b15c097ac6ad81c3385a74056207641af72f622c2e26ed0bb717cdbc604
-
Size
534KB
-
Sample
241105-1xe26azapf
-
MD5
70638821565c907bc1b6ea35a5696dfc
-
SHA1
edcf13b873d1ab30cd86187d8671cfdda7b28dfc
-
SHA256
c64c7b15c097ac6ad81c3385a74056207641af72f622c2e26ed0bb717cdbc604
-
SHA512
852ea94cc95c96b7a9931f42f883923d54d112d6405237e16f0b800f1d8c83733ecd4abfc76df77b0f153a3ac2a22c7874e266bb6b74c8cf95c98cf580bddeff
-
SSDEEP
12288:SMroy90dGfOoq3BehyfCmXgjzcbOWr8BwdgrRm4:OySGM3BehyfCagjzUOyuwdcB
Static task
static1
Behavioral task
behavioral1
Sample
c64c7b15c097ac6ad81c3385a74056207641af72f622c2e26ed0bb717cdbc604.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c64c7b15c097ac6ad81c3385a74056207641af72f622c2e26ed0bb717cdbc604
-
Size
534KB
-
MD5
70638821565c907bc1b6ea35a5696dfc
-
SHA1
edcf13b873d1ab30cd86187d8671cfdda7b28dfc
-
SHA256
c64c7b15c097ac6ad81c3385a74056207641af72f622c2e26ed0bb717cdbc604
-
SHA512
852ea94cc95c96b7a9931f42f883923d54d112d6405237e16f0b800f1d8c83733ecd4abfc76df77b0f153a3ac2a22c7874e266bb6b74c8cf95c98cf580bddeff
-
SSDEEP
12288:SMroy90dGfOoq3BehyfCmXgjzcbOWr8BwdgrRm4:OySGM3BehyfCagjzUOyuwdcB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1