General
-
Target
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea
-
Size
673KB
-
Sample
241105-t26x4svamg
-
MD5
16cbc1c59c400eeb3c36adc7adaf1cc1
-
SHA1
c0f71e175b5af47aed28e274b8b1f856ff05a328
-
SHA256
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea
-
SHA512
e2f661f48f0336cfbb4d40e5a186d26bf12d8c8fccafd528f11355b51885259d37bbc3ff82b62481ad12dabee8534442046608998623a3d924a8ed0849a026c0
-
SSDEEP
12288:gMrGy90JSfXA8tIXVuu52MeFWIa+UdirxuWphuPzbrh:2yuUQ8oua2ra1KuSCB
Static task
static1
Behavioral task
behavioral1
Sample
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea
-
Size
673KB
-
MD5
16cbc1c59c400eeb3c36adc7adaf1cc1
-
SHA1
c0f71e175b5af47aed28e274b8b1f856ff05a328
-
SHA256
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea
-
SHA512
e2f661f48f0336cfbb4d40e5a186d26bf12d8c8fccafd528f11355b51885259d37bbc3ff82b62481ad12dabee8534442046608998623a3d924a8ed0849a026c0
-
SSDEEP
12288:gMrGy90JSfXA8tIXVuu52MeFWIa+UdirxuWphuPzbrh:2yuUQ8oua2ra1KuSCB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1