General
-
Target
5c440b9d0224ababf4b9dfdf2199fea3b0d764a4bd59d88f11a2f65e66f356f6
-
Size
935KB
-
Sample
241105-n55xbssrhq
-
MD5
be0bc4226c2543006f8184be14d1574f
-
SHA1
81c11630f7acec8bb42ec1701844ed01b916df42
-
SHA256
5c440b9d0224ababf4b9dfdf2199fea3b0d764a4bd59d88f11a2f65e66f356f6
-
SHA512
d07fb551df5b80fa82d4d17f41e934861ed60dd79111d60bdbd5c553e8a4d32ed43b6807a7c4eabf534688778ad8514567b649422c62da5ffe7ec509f2fcd09a
-
SSDEEP
24576:Vy4nRXtzMMvRrAFn4mcB0s6AmWz3fZRoTXVRJ:wGA2OAB0s6iPZR8
Static task
static1
Behavioral task
behavioral1
Sample
5c440b9d0224ababf4b9dfdf2199fea3b0d764a4bd59d88f11a2f65e66f356f6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5c440b9d0224ababf4b9dfdf2199fea3b0d764a4bd59d88f11a2f65e66f356f6
-
Size
935KB
-
MD5
be0bc4226c2543006f8184be14d1574f
-
SHA1
81c11630f7acec8bb42ec1701844ed01b916df42
-
SHA256
5c440b9d0224ababf4b9dfdf2199fea3b0d764a4bd59d88f11a2f65e66f356f6
-
SHA512
d07fb551df5b80fa82d4d17f41e934861ed60dd79111d60bdbd5c553e8a4d32ed43b6807a7c4eabf534688778ad8514567b649422c62da5ffe7ec509f2fcd09a
-
SSDEEP
24576:Vy4nRXtzMMvRrAFn4mcB0s6AmWz3fZRoTXVRJ:wGA2OAB0s6iPZR8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1