General
-
Target
ad6dc00b719601b8e3ad5781022e2ee7eefc7f2521b1e5e46e9373bdf0bed060
-
Size
673KB
-
Sample
241105-3d8w8szpbt
-
MD5
bc5f9ce9ed9c89fd4925abf9d8fd1c21
-
SHA1
85442b92e6a6709a8aa10fdb0b7138785c25cbff
-
SHA256
ad6dc00b719601b8e3ad5781022e2ee7eefc7f2521b1e5e46e9373bdf0bed060
-
SHA512
7275cb3b7f0b606ac48c9d510da8922d78aa130da781d338d6378701f27a560a6463886f1a9531d8af217084e15de50db601a6f35a5241cad72bdeaff12ddb83
-
SSDEEP
12288:cMrby90fU0Hai8m5P2m6EpnOuZU2MBFn4eA096UdNuW0MkZ4P9J2:/yaU0HaVm5P2/EQuZU2VeR6Ubub69k
Static task
static1
Behavioral task
behavioral1
Sample
ad6dc00b719601b8e3ad5781022e2ee7eefc7f2521b1e5e46e9373bdf0bed060.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ad6dc00b719601b8e3ad5781022e2ee7eefc7f2521b1e5e46e9373bdf0bed060
-
Size
673KB
-
MD5
bc5f9ce9ed9c89fd4925abf9d8fd1c21
-
SHA1
85442b92e6a6709a8aa10fdb0b7138785c25cbff
-
SHA256
ad6dc00b719601b8e3ad5781022e2ee7eefc7f2521b1e5e46e9373bdf0bed060
-
SHA512
7275cb3b7f0b606ac48c9d510da8922d78aa130da781d338d6378701f27a560a6463886f1a9531d8af217084e15de50db601a6f35a5241cad72bdeaff12ddb83
-
SSDEEP
12288:cMrby90fU0Hai8m5P2m6EpnOuZU2MBFn4eA096UdNuW0MkZ4P9J2:/yaU0HaVm5P2/EQuZU2VeR6Ubub69k
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1