General
-
Target
6d19762d9d43d7d688b9969a275df2a20e937370bf20414116ec8e5c7b08d869
-
Size
530KB
-
Sample
241105-h7lnkswpas
-
MD5
87b114f3c914721e8c99f22ee9cb372e
-
SHA1
14540d978e1329ae9b594ced547ade6c456517e6
-
SHA256
6d19762d9d43d7d688b9969a275df2a20e937370bf20414116ec8e5c7b08d869
-
SHA512
f76c41972556db81c3f852eecff57ae88356c203c15513be6b37972cf891e4c243c3b45b6c5cc859313eeca52fe14118318019f7fefee5cbed2de77b32bbad51
-
SSDEEP
12288:BMrWy90h1V2b1WDKVL4hyMmSySjAbHBajeQtqBZX1Npiiyt:nyQXFYkhyYyS9aQ8v1Nvyt
Static task
static1
Behavioral task
behavioral1
Sample
6d19762d9d43d7d688b9969a275df2a20e937370bf20414116ec8e5c7b08d869.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6d19762d9d43d7d688b9969a275df2a20e937370bf20414116ec8e5c7b08d869
-
Size
530KB
-
MD5
87b114f3c914721e8c99f22ee9cb372e
-
SHA1
14540d978e1329ae9b594ced547ade6c456517e6
-
SHA256
6d19762d9d43d7d688b9969a275df2a20e937370bf20414116ec8e5c7b08d869
-
SHA512
f76c41972556db81c3f852eecff57ae88356c203c15513be6b37972cf891e4c243c3b45b6c5cc859313eeca52fe14118318019f7fefee5cbed2de77b32bbad51
-
SSDEEP
12288:BMrWy90h1V2b1WDKVL4hyMmSySjAbHBajeQtqBZX1Npiiyt:nyQXFYkhyYyS9aQ8v1Nvyt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1