General
-
Target
6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128
-
Size
658KB
-
Sample
241105-mrvnrszhkp
-
MD5
0a9cc72bd813113746fe30d5d09e62ce
-
SHA1
b27f2e1eb988570812f28802e5380707e93c14bd
-
SHA256
6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128
-
SHA512
b56838298ae2d6df6ed33bca2c099d08262f066ccf72700970a9448cbd0e5d44db4e4545b498e17f89509f16194b709b2598e6db2078bb3cccea8149523da728
-
SSDEEP
12288:IMrUy90J70DjLbK0Yn2C9vR3NQCaTRP3KCvK/qiku2GgiG96gzg/EVeaOKBtwJUu:My64/bTYn2CdQH1S/qiF2Ggr97/5OKBQ
Static task
static1
Behavioral task
behavioral1
Sample
6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128
-
Size
658KB
-
MD5
0a9cc72bd813113746fe30d5d09e62ce
-
SHA1
b27f2e1eb988570812f28802e5380707e93c14bd
-
SHA256
6508fd789b17d059e359f53dbfc351070c07327c91c8cbe34bedc66266fd7128
-
SHA512
b56838298ae2d6df6ed33bca2c099d08262f066ccf72700970a9448cbd0e5d44db4e4545b498e17f89509f16194b709b2598e6db2078bb3cccea8149523da728
-
SSDEEP
12288:IMrUy90J70DjLbK0Yn2C9vR3NQCaTRP3KCvK/qiku2GgiG96gzg/EVeaOKBtwJUu:My64/bTYn2CdQH1S/qiF2Ggr97/5OKBQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1