General
-
Target
dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee
-
Size
530KB
-
Sample
241105-3j4jpszphz
-
MD5
ab3105555add0a4c64021d32ffe026da
-
SHA1
4a6e9f842520c2a1e040068e1c8daa5540c66f05
-
SHA256
dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee
-
SHA512
4888461ae956792939334c4f7da50e332c5d415c756bd32a29ad27c8de47e5f60cbb28dfb000f9f0c36b608f48dd3377f8d94b31e1061497e2476b9509598ba1
-
SSDEEP
12288:RMr8y90ncwjGTveh++4oYbJrBT2E87xIMg593Vyk9kgIZ:RyEj4S++kbT2E81vIFyMkPZ
Static task
static1
Behavioral task
behavioral1
Sample
dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee
-
Size
530KB
-
MD5
ab3105555add0a4c64021d32ffe026da
-
SHA1
4a6e9f842520c2a1e040068e1c8daa5540c66f05
-
SHA256
dc8c1400157963ca589b84b40c04a0a6486453e7d61bba3e951fce65c979d6ee
-
SHA512
4888461ae956792939334c4f7da50e332c5d415c756bd32a29ad27c8de47e5f60cbb28dfb000f9f0c36b608f48dd3377f8d94b31e1061497e2476b9509598ba1
-
SSDEEP
12288:RMr8y90ncwjGTveh++4oYbJrBT2E87xIMg593Vyk9kgIZ:RyEj4S++kbT2E81vIFyMkPZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1