General
-
Target
751784b749e0200771d6a68cc3eab8d59103a2d6b9facc85dd05c98f723b63fc
-
Size
671KB
-
Sample
241105-q43fxsshnk
-
MD5
c602c1f617303100255ac4f5b9bec7df
-
SHA1
9f37fafb15e2938700dd4f9e9ef02bafe5a61b10
-
SHA256
751784b749e0200771d6a68cc3eab8d59103a2d6b9facc85dd05c98f723b63fc
-
SHA512
6bdfc5d0fb4a1f56ba7af6bed11062cb6951d8f5b76817b69c19be6dfb74f733a8969b7dc845f609f7b024b20377b31d1a05ae6d563a66a257d0a42135a27054
-
SSDEEP
12288:UMrry90n2D4ZzCPc1u3yTKrhboNrcVQCaHYMsxzO9jsVszcivrT:/yDzPfMSbolcVVaHvKq91cY
Static task
static1
Behavioral task
behavioral1
Sample
751784b749e0200771d6a68cc3eab8d59103a2d6b9facc85dd05c98f723b63fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
751784b749e0200771d6a68cc3eab8d59103a2d6b9facc85dd05c98f723b63fc
-
Size
671KB
-
MD5
c602c1f617303100255ac4f5b9bec7df
-
SHA1
9f37fafb15e2938700dd4f9e9ef02bafe5a61b10
-
SHA256
751784b749e0200771d6a68cc3eab8d59103a2d6b9facc85dd05c98f723b63fc
-
SHA512
6bdfc5d0fb4a1f56ba7af6bed11062cb6951d8f5b76817b69c19be6dfb74f733a8969b7dc845f609f7b024b20377b31d1a05ae6d563a66a257d0a42135a27054
-
SSDEEP
12288:UMrry90n2D4ZzCPc1u3yTKrhboNrcVQCaHYMsxzO9jsVszcivrT:/yDzPfMSbolcVVaHvKq91cY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1