General
-
Target
cdf613b87ed4fce3bd460d80d9521ed517955427b3fc22e1c41e17c13ba45ac8
-
Size
838KB
-
Sample
241105-kfk9vaxlcz
-
MD5
6e6799b212739a1c22b4d43ea91f6217
-
SHA1
ad5cd8189368c2aea457b39e20c44e51472da0f0
-
SHA256
cdf613b87ed4fce3bd460d80d9521ed517955427b3fc22e1c41e17c13ba45ac8
-
SHA512
731efcfa5331e391e332886004b5f633f8554231a86246bce8e35035a2ff5191136f78cbb99343c2e97da09afa786d88cef334970bcc153e33e8812ad45e3d48
-
SSDEEP
24576:MycbvIulWZB9+0MTwR8LbPf5GkArz90rLZ8:7cbBlWT9+0ii8Lfgk6zSx
Static task
static1
Behavioral task
behavioral1
Sample
cdf613b87ed4fce3bd460d80d9521ed517955427b3fc22e1c41e17c13ba45ac8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
cdf613b87ed4fce3bd460d80d9521ed517955427b3fc22e1c41e17c13ba45ac8
-
Size
838KB
-
MD5
6e6799b212739a1c22b4d43ea91f6217
-
SHA1
ad5cd8189368c2aea457b39e20c44e51472da0f0
-
SHA256
cdf613b87ed4fce3bd460d80d9521ed517955427b3fc22e1c41e17c13ba45ac8
-
SHA512
731efcfa5331e391e332886004b5f633f8554231a86246bce8e35035a2ff5191136f78cbb99343c2e97da09afa786d88cef334970bcc153e33e8812ad45e3d48
-
SSDEEP
24576:MycbvIulWZB9+0MTwR8LbPf5GkArz90rLZ8:7cbBlWT9+0ii8Lfgk6zSx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1