General
-
Target
6fdf7b7781928881398b283c83d3552859072df540eb792172c880ec1c854ccb
-
Size
698KB
-
Sample
241105-qbv65stpgq
-
MD5
8875e67beadd4582288a8cbed7d6c63c
-
SHA1
96c48e33e56574d5d43fcfe6a61125f0bccafcdc
-
SHA256
6fdf7b7781928881398b283c83d3552859072df540eb792172c880ec1c854ccb
-
SHA512
92a6c7c31f24dbb57ad7761c8e9b37ac8dd6f5e40492307c17e7010e8da11b0153afd0b0ce9d998a270caa603518fd3bd543dcca9f30d3968c79271b6614cc6b
-
SSDEEP
12288:JMrLy90qjx7H7cmRFWDxLH5YYOvTz43OPg5PGqlXrdv3732S9ycjChZ:Cyb9DIGQVL3Ovfkgg5Pnlbh2zThZ
Static task
static1
Behavioral task
behavioral1
Sample
6fdf7b7781928881398b283c83d3552859072df540eb792172c880ec1c854ccb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6fdf7b7781928881398b283c83d3552859072df540eb792172c880ec1c854ccb
-
Size
698KB
-
MD5
8875e67beadd4582288a8cbed7d6c63c
-
SHA1
96c48e33e56574d5d43fcfe6a61125f0bccafcdc
-
SHA256
6fdf7b7781928881398b283c83d3552859072df540eb792172c880ec1c854ccb
-
SHA512
92a6c7c31f24dbb57ad7761c8e9b37ac8dd6f5e40492307c17e7010e8da11b0153afd0b0ce9d998a270caa603518fd3bd543dcca9f30d3968c79271b6614cc6b
-
SSDEEP
12288:JMrLy90qjx7H7cmRFWDxLH5YYOvTz43OPg5PGqlXrdv3732S9ycjChZ:Cyb9DIGQVL3Ovfkgg5Pnlbh2zThZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1