General
-
Target
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae
-
Size
671KB
-
Sample
241105-ped7cs1gpk
-
MD5
f45b72f6ea229c63decfbfc2cd862233
-
SHA1
7ad127dd41c0bc9488da27f945c08c880eaf51cc
-
SHA256
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae
-
SHA512
8a55381153590f26d7ee26185cae02a5e928d9f0d9c941ddba85ab39bbf16c6358d6d469f6b05232f479dec3d337d5bae1c044514ff09b93d6e7ac03be32c95f
-
SSDEEP
12288:gMr+y906lWY/Tas6ivb6DI2gviGvrIwVLLPGunbOaiyy0emzyi1os1kDlLpY/:OyDsJsLS6xrIwVv+vdyy0emzT2qk3Y
Static task
static1
Behavioral task
behavioral1
Sample
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae
-
Size
671KB
-
MD5
f45b72f6ea229c63decfbfc2cd862233
-
SHA1
7ad127dd41c0bc9488da27f945c08c880eaf51cc
-
SHA256
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae
-
SHA512
8a55381153590f26d7ee26185cae02a5e928d9f0d9c941ddba85ab39bbf16c6358d6d469f6b05232f479dec3d337d5bae1c044514ff09b93d6e7ac03be32c95f
-
SSDEEP
12288:gMr+y906lWY/Tas6ivb6DI2gviGvrIwVLLPGunbOaiyy0emzyi1os1kDlLpY/:OyDsJsLS6xrIwVv+vdyy0emzT2qk3Y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1