General
-
Target
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
Size
658KB
-
Sample
241105-t55jfstpcy
-
MD5
f0c9fab00b2273d8e92a7ad68517bde5
-
SHA1
dcf24c80fe6276bd0e5ed8590089ed0fc807d7b7
-
SHA256
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
SHA512
afc9500d2d077040637845bb68ad652bef6c9faced472ddc90831d2e143ea59dc6beadee0a3aa6c7deb0971798e3da0b7bf7178ddf663a30022a75dbf4794f88
-
SSDEEP
12288:8Mryy90SYziktCuFRcjtka3MtD4c6WLt8sWij4q44OzWK2o8vOu6446:Gyyzm0RcxtMtMc6WhOm4L4XKnud
Static task
static1
Behavioral task
behavioral1
Sample
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
Size
658KB
-
MD5
f0c9fab00b2273d8e92a7ad68517bde5
-
SHA1
dcf24c80fe6276bd0e5ed8590089ed0fc807d7b7
-
SHA256
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
SHA512
afc9500d2d077040637845bb68ad652bef6c9faced472ddc90831d2e143ea59dc6beadee0a3aa6c7deb0971798e3da0b7bf7178ddf663a30022a75dbf4794f88
-
SSDEEP
12288:8Mryy90SYziktCuFRcjtka3MtD4c6WLt8sWij4q44OzWK2o8vOu6446:Gyyzm0RcxtMtMc6WhOm4L4XKnud
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1