General
-
Target
488f6a53b4b4bd657f5dfda56c640cad9f550dc5ecf7e62e707ff4dca00a52ec
-
Size
674KB
-
Sample
241105-skpf3aspcs
-
MD5
1bc87bb6b17b4f06de02bc3275293531
-
SHA1
6108f393c6f288a63df40a013339a18cfb3edbcb
-
SHA256
488f6a53b4b4bd657f5dfda56c640cad9f550dc5ecf7e62e707ff4dca00a52ec
-
SHA512
06ece89880881f351e4a49c5912abd11713587d661c32f72d33c83b332b0a3b83ce6b81a2ecdf001c001bf27c9915a8333d80b8ff5c604132ad05afe3a84139c
-
SSDEEP
12288:ZMrYy90rtIqDclB9aoFO4aOON4W/loYX1gGK61GW/6cAy2mf:Jyq5c1aoM4aOk4WOYDKup/PA0
Static task
static1
Behavioral task
behavioral1
Sample
488f6a53b4b4bd657f5dfda56c640cad9f550dc5ecf7e62e707ff4dca00a52ec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
488f6a53b4b4bd657f5dfda56c640cad9f550dc5ecf7e62e707ff4dca00a52ec
-
Size
674KB
-
MD5
1bc87bb6b17b4f06de02bc3275293531
-
SHA1
6108f393c6f288a63df40a013339a18cfb3edbcb
-
SHA256
488f6a53b4b4bd657f5dfda56c640cad9f550dc5ecf7e62e707ff4dca00a52ec
-
SHA512
06ece89880881f351e4a49c5912abd11713587d661c32f72d33c83b332b0a3b83ce6b81a2ecdf001c001bf27c9915a8333d80b8ff5c604132ad05afe3a84139c
-
SSDEEP
12288:ZMrYy90rtIqDclB9aoFO4aOON4W/loYX1gGK61GW/6cAy2mf:Jyq5c1aoM4aOk4WOYDKup/PA0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1