General
-
Target
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65
-
Size
560KB
-
Sample
241105-v7rk2svlcs
-
MD5
24a8e98a7e10a2312697143ec276c2cd
-
SHA1
db4175ad094d1ca247107941cc83ca8c7fa56083
-
SHA256
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65
-
SHA512
bd5d102b46ab5b1f6697655c3c61d468a64c8ac8a4c3e94896b7e7f5b1c7152257b53e5d976c472fe2939bc65a32123e791944c0063593e8c228b3dcc7a22c1b
-
SSDEEP
12288:VMrIy90ZDBh+MrLJIKaWvA+Sfx8ElxJqfx2QOFGXOe:hy4n+0rfC8El+fx2QOcL
Static task
static1
Behavioral task
behavioral1
Sample
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65
-
Size
560KB
-
MD5
24a8e98a7e10a2312697143ec276c2cd
-
SHA1
db4175ad094d1ca247107941cc83ca8c7fa56083
-
SHA256
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65
-
SHA512
bd5d102b46ab5b1f6697655c3c61d468a64c8ac8a4c3e94896b7e7f5b1c7152257b53e5d976c472fe2939bc65a32123e791944c0063593e8c228b3dcc7a22c1b
-
SSDEEP
12288:VMrIy90ZDBh+MrLJIKaWvA+Sfx8ElxJqfx2QOFGXOe:hy4n+0rfC8El+fx2QOcL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1