General
-
Target
cfb2d1611960dd02b29525d8717af1c1b211dafeb29cd7fcb1b4a2c0c06146da
-
Size
522KB
-
Sample
241105-tvbtdsvfjk
-
MD5
c406bd49c7c87401791ec99a758bd05c
-
SHA1
8ecd1f05eca0a4577a4b6b4ded439ee249235426
-
SHA256
cfb2d1611960dd02b29525d8717af1c1b211dafeb29cd7fcb1b4a2c0c06146da
-
SHA512
5c05ff0cc894a5882eb8bd41183bdc043990e2a695328b555dc4e9f0263a4304d86f81c9c3f18d92ae192502683d564bd640e21d11d20f3a18a6db1685383ef3
-
SSDEEP
12288:KMrzy90/POlOd3NEEi5gX6qY4m0YBn3L16bKKs4:RyiWlkdEEiOX6qY48B71QNd
Static task
static1
Behavioral task
behavioral1
Sample
cfb2d1611960dd02b29525d8717af1c1b211dafeb29cd7fcb1b4a2c0c06146da.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
cfb2d1611960dd02b29525d8717af1c1b211dafeb29cd7fcb1b4a2c0c06146da
-
Size
522KB
-
MD5
c406bd49c7c87401791ec99a758bd05c
-
SHA1
8ecd1f05eca0a4577a4b6b4ded439ee249235426
-
SHA256
cfb2d1611960dd02b29525d8717af1c1b211dafeb29cd7fcb1b4a2c0c06146da
-
SHA512
5c05ff0cc894a5882eb8bd41183bdc043990e2a695328b555dc4e9f0263a4304d86f81c9c3f18d92ae192502683d564bd640e21d11d20f3a18a6db1685383ef3
-
SSDEEP
12288:KMrzy90/POlOd3NEEi5gX6qY4m0YBn3L16bKKs4:RyiWlkdEEiOX6qY48B71QNd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1