General
-
Target
87e0b866400de36b2243494db21cfe93bcbed2656a8674859faac54f2e35b447
-
Size
531KB
-
Sample
241105-v932vsxrgj
-
MD5
9bc1cb8f0b5abb059b4ea8adbdc59d32
-
SHA1
648bab1192a956d12f146da1abb467a7b21d5fec
-
SHA256
87e0b866400de36b2243494db21cfe93bcbed2656a8674859faac54f2e35b447
-
SHA512
0424ffca31cb498447859138fbf27d700996e1133f06a30ab76dfdebeb3191693fed693b1287a39b412c1da07c19243b02b4931920c2ecdf1c4c2eea2acf1fef
-
SSDEEP
12288:vMrky90WSGqDMAYeaPjIhQ/Dn7of5KXa/f8AOC0if6f1/c:XytS19YJIhsAA+8n3a6Fc
Static task
static1
Behavioral task
behavioral1
Sample
87e0b866400de36b2243494db21cfe93bcbed2656a8674859faac54f2e35b447.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
87e0b866400de36b2243494db21cfe93bcbed2656a8674859faac54f2e35b447
-
Size
531KB
-
MD5
9bc1cb8f0b5abb059b4ea8adbdc59d32
-
SHA1
648bab1192a956d12f146da1abb467a7b21d5fec
-
SHA256
87e0b866400de36b2243494db21cfe93bcbed2656a8674859faac54f2e35b447
-
SHA512
0424ffca31cb498447859138fbf27d700996e1133f06a30ab76dfdebeb3191693fed693b1287a39b412c1da07c19243b02b4931920c2ecdf1c4c2eea2acf1fef
-
SSDEEP
12288:vMrky90WSGqDMAYeaPjIhQ/Dn7of5KXa/f8AOC0if6f1/c:XytS19YJIhsAA+8n3a6Fc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1