General
-
Target
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d
-
Size
683KB
-
Sample
241105-3gykns1cmh
-
MD5
5c54d14346b422bd90ac03852e0f9e23
-
SHA1
27823c11e489e1c41960186e7f0c89e66dff907a
-
SHA256
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d
-
SHA512
24bc1e1329d383006a6b25dafe9ec15f79d8dc7a2dde6e5a29a45b6db4b00e70de3faf5091052980deb9431ac3f12436bb68511d75ee3af92d9fc0e9a64a66af
-
SSDEEP
12288:JMrgy90JV8wIQugROhialiJv1bj+0LhzyfsFW7bUPBmnL3fwAjUKBTTd4:tyWTym1bnusGbKmnL4ABxd4
Static task
static1
Behavioral task
behavioral1
Sample
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d
-
Size
683KB
-
MD5
5c54d14346b422bd90ac03852e0f9e23
-
SHA1
27823c11e489e1c41960186e7f0c89e66dff907a
-
SHA256
97d8c8e4e7ccc0e8ca3d3089660412259682bdb7e7ddaad6b8579ceabde06d5d
-
SHA512
24bc1e1329d383006a6b25dafe9ec15f79d8dc7a2dde6e5a29a45b6db4b00e70de3faf5091052980deb9431ac3f12436bb68511d75ee3af92d9fc0e9a64a66af
-
SSDEEP
12288:JMrgy90JV8wIQugROhialiJv1bj+0LhzyfsFW7bUPBmnL3fwAjUKBTTd4:tyWTym1bnusGbKmnL4ABxd4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1