General
-
Target
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c
-
Size
689KB
-
Sample
241105-ttgy1stmet
-
MD5
4d4dfa914d21ce50d8641531f1c7210d
-
SHA1
3ede63fe926c872db47138acfb3b6739aab1cde9
-
SHA256
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c
-
SHA512
6aab008ecdef67fabf60e0b0e2cc980637fad90438731311364ed73aaa511a9cdf2ef0057418c981cdbfd296eacbe66d822ad7462eb0a2e529d5ad4b9d8adf23
-
SSDEEP
12288:0Mrsy90OM9MIpGWDSxPqMhQKDF+IStCP/aQeaSEmErxJgO0vH3Wx:oyLGpGWDynuGF+IhP/aHazmErkO0PI
Static task
static1
Behavioral task
behavioral1
Sample
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c
-
Size
689KB
-
MD5
4d4dfa914d21ce50d8641531f1c7210d
-
SHA1
3ede63fe926c872db47138acfb3b6739aab1cde9
-
SHA256
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c
-
SHA512
6aab008ecdef67fabf60e0b0e2cc980637fad90438731311364ed73aaa511a9cdf2ef0057418c981cdbfd296eacbe66d822ad7462eb0a2e529d5ad4b9d8adf23
-
SSDEEP
12288:0Mrsy90OM9MIpGWDSxPqMhQKDF+IStCP/aQeaSEmErxJgO0vH3Wx:oyLGpGWDynuGF+IhP/aHazmErkO0PI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1