General
-
Target
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35
-
Size
522KB
-
Sample
241105-g3cdnsxbnj
-
MD5
af8a80478cbb4e4b96d03afec9f62ed3
-
SHA1
9aee55c9bd91317dd3dde1f9f8fc9a549e130ef0
-
SHA256
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35
-
SHA512
f2c4787fc333cb4f237325c351bd31185eb97712e16f40ff10c3932559056aaf4c8ffcb20cfabd3f3ce4a168549540a440270119affc16f688240abc4e76617a
-
SSDEEP
12288:hMrCy90Ugx/MPQSyf7PxVUB2pw25kgL+8lTTx:Xy7JYV7xVA2C0koppx
Static task
static1
Behavioral task
behavioral1
Sample
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35
-
Size
522KB
-
MD5
af8a80478cbb4e4b96d03afec9f62ed3
-
SHA1
9aee55c9bd91317dd3dde1f9f8fc9a549e130ef0
-
SHA256
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35
-
SHA512
f2c4787fc333cb4f237325c351bd31185eb97712e16f40ff10c3932559056aaf4c8ffcb20cfabd3f3ce4a168549540a440270119affc16f688240abc4e76617a
-
SSDEEP
12288:hMrCy90Ugx/MPQSyf7PxVUB2pw25kgL+8lTTx:Xy7JYV7xVA2C0koppx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1