General
-
Target
06cb7fbccba4c806d4e118d0f28a577ef77e6631791aca0d1a0dfe1bfec21baf
-
Size
659KB
-
Sample
241105-g6944sypdk
-
MD5
45eec1cfeeaf8c567e38a030799ea373
-
SHA1
1a895e55725a67e992738481dcc61a10b3e22de2
-
SHA256
06cb7fbccba4c806d4e118d0f28a577ef77e6631791aca0d1a0dfe1bfec21baf
-
SHA512
eebb5abd8904280b39ef40a7291f4d49bafebea0a14123fa8810643b41fd4b318deb3280d145bf31b6f1d7f20bb86a2cddf08e4058b4fd54ee54a098c51f239d
-
SSDEEP
12288:eMrgy90GZML5dA1JCmn9ftzrt2Z2tXLlWK3LKYJo4x2Z644rzWK8r8vh1XxWu:iyLydA1JCmNtft20NbK+YZ74WK1Wu
Static task
static1
Behavioral task
behavioral1
Sample
06cb7fbccba4c806d4e118d0f28a577ef77e6631791aca0d1a0dfe1bfec21baf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
06cb7fbccba4c806d4e118d0f28a577ef77e6631791aca0d1a0dfe1bfec21baf
-
Size
659KB
-
MD5
45eec1cfeeaf8c567e38a030799ea373
-
SHA1
1a895e55725a67e992738481dcc61a10b3e22de2
-
SHA256
06cb7fbccba4c806d4e118d0f28a577ef77e6631791aca0d1a0dfe1bfec21baf
-
SHA512
eebb5abd8904280b39ef40a7291f4d49bafebea0a14123fa8810643b41fd4b318deb3280d145bf31b6f1d7f20bb86a2cddf08e4058b4fd54ee54a098c51f239d
-
SSDEEP
12288:eMrgy90GZML5dA1JCmn9ftzrt2Z2tXLlWK3LKYJo4x2Z644rzWK8r8vh1XxWu:iyLydA1JCmNtft20NbK+YZ74WK1Wu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1