General
-
Target
e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f
-
Size
658KB
-
Sample
241105-lk68jsydlb
-
MD5
b972d05fd992c174e476b8723e781a8e
-
SHA1
60aa9b76dc5e9a8bc273452ef9977b8ddb1034c3
-
SHA256
e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f
-
SHA512
eaec185e2e0a0c20c16af734c72dc651de4ee668f5d9dce16b597bdc44eab55b62c085585ab054006ba0335f78b6c316cb969eb58e007df48020d74a0627a1de
-
SSDEEP
12288:oMr1y90W92NdeiJxcuCPMYNMYtiJTPBJvIT8Lt8CBSs49446zWKl18vWkAHsT8:tyL9eeRuYNMYtq9Jvw8h/N4e4DK46N
Static task
static1
Behavioral task
behavioral1
Sample
e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f
-
Size
658KB
-
MD5
b972d05fd992c174e476b8723e781a8e
-
SHA1
60aa9b76dc5e9a8bc273452ef9977b8ddb1034c3
-
SHA256
e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f
-
SHA512
eaec185e2e0a0c20c16af734c72dc651de4ee668f5d9dce16b597bdc44eab55b62c085585ab054006ba0335f78b6c316cb969eb58e007df48020d74a0627a1de
-
SSDEEP
12288:oMr1y90W92NdeiJxcuCPMYNMYtiJTPBJvIT8Lt8CBSs49446zWKl18vWkAHsT8:tyL9eeRuYNMYtq9Jvw8h/N4e4DK46N
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1