General
-
Target
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301
-
Size
533KB
-
Sample
241105-mkenzazgkr
-
MD5
8cc772bd63d802fe97cac2d2963ce5b0
-
SHA1
1dd5031fd159ea6b115f784943f3ab3ef5cad137
-
SHA256
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301
-
SHA512
c12cdbdd8b4e43abc267972ed4b5317fa2568137bd1715c47ab137529b48dd7fd41cea3d4b613a63e761043ecce9de43bcc774c3cc43059a1873a7b72dbc4fff
-
SSDEEP
12288:CMrUy905YyLnhiwzNElIWjz9NbYdtln5t8OzKJo:qyYYyjhl2lTjpN03tdJ
Static task
static1
Behavioral task
behavioral1
Sample
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301
-
Size
533KB
-
MD5
8cc772bd63d802fe97cac2d2963ce5b0
-
SHA1
1dd5031fd159ea6b115f784943f3ab3ef5cad137
-
SHA256
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301
-
SHA512
c12cdbdd8b4e43abc267972ed4b5317fa2568137bd1715c47ab137529b48dd7fd41cea3d4b613a63e761043ecce9de43bcc774c3cc43059a1873a7b72dbc4fff
-
SSDEEP
12288:CMrUy905YyLnhiwzNElIWjz9NbYdtln5t8OzKJo:qyYYyjhl2lTjpN03tdJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1