General
-
Target
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76
-
Size
690KB
-
Sample
241105-2kp72azemh
-
MD5
be9b041e2130c6e1581b48aa1324bbef
-
SHA1
eafff7350f613c9ea9b7df9a089dd91ce53c9355
-
SHA256
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76
-
SHA512
63f155964ca5d241853582ca72e70a98a7b991ad6cfd2e59a3ec31454cbc9c0396382a5ff8150a788896ba7509f911573153549352fc9451e50e7b4a18958d95
-
SSDEEP
12288:1Mrky90mqxoQSYzGH8TmKNdCEsVh5R7MiEgHFKduhXNx8tcLrXGWBqsGoL:xyO1ShymSFOhLtFlxdx8tcvFGoL
Static task
static1
Behavioral task
behavioral1
Sample
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76
-
Size
690KB
-
MD5
be9b041e2130c6e1581b48aa1324bbef
-
SHA1
eafff7350f613c9ea9b7df9a089dd91ce53c9355
-
SHA256
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76
-
SHA512
63f155964ca5d241853582ca72e70a98a7b991ad6cfd2e59a3ec31454cbc9c0396382a5ff8150a788896ba7509f911573153549352fc9451e50e7b4a18958d95
-
SSDEEP
12288:1Mrky90mqxoQSYzGH8TmKNdCEsVh5R7MiEgHFKduhXNx8tcLrXGWBqsGoL:xyO1ShymSFOhLtFlxdx8tcvFGoL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1