General
-
Target
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38
-
Size
560KB
-
Sample
241105-f1ce8avldv
-
MD5
562a3701c1c68ced57ccf731b5363195
-
SHA1
5d4646eb309549d6aaa0f2e5ed97d051960329f1
-
SHA256
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38
-
SHA512
9f91cbb04412f3d71175f5ae69e078824c44204425b46214cb21a97fa9f57d55dd6005e7beff29bd9797738338f3c69894f7cf9bf46d317fdbe573aaf8970228
-
SSDEEP
12288:+MrKy90bRt0mkO07iskGBfw/zMZey9ElxJ+89RVCQVcw37Ni0LEl5:IyQkqszoYZey9ElT9RTcwrE3
Static task
static1
Behavioral task
behavioral1
Sample
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38
-
Size
560KB
-
MD5
562a3701c1c68ced57ccf731b5363195
-
SHA1
5d4646eb309549d6aaa0f2e5ed97d051960329f1
-
SHA256
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38
-
SHA512
9f91cbb04412f3d71175f5ae69e078824c44204425b46214cb21a97fa9f57d55dd6005e7beff29bd9797738338f3c69894f7cf9bf46d317fdbe573aaf8970228
-
SSDEEP
12288:+MrKy90bRt0mkO07iskGBfw/zMZey9ElxJ+89RVCQVcw37Ni0LEl5:IyQkqszoYZey9ElT9RTcwrE3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1