General
-
Target
66565b59ed52e6808a087c575cf43e4becc5b02613139616036c833945a7dbd0
-
Size
671KB
-
Sample
241105-w1v6bsxajr
-
MD5
25d76ecb756926a6a8a82525d5662b60
-
SHA1
63d9c06c727f1507db749f8882765d2842ba2646
-
SHA256
66565b59ed52e6808a087c575cf43e4becc5b02613139616036c833945a7dbd0
-
SHA512
2433c190f81bae6f75355b6dc25ba5f6d9404aa398a91a997201afe3e907698b386028d3e85423cc3eceb368da726198f44a4c3be13d5e57c9ed39eb334d95af
-
SSDEEP
12288:dMrqy90qzMkxKep9kzO0fgbeo++ks2odFq3LqcNnwkun84Uk3YLRT:DyTzMaozO0fHo3q3GcxW8YYR
Static task
static1
Behavioral task
behavioral1
Sample
66565b59ed52e6808a087c575cf43e4becc5b02613139616036c833945a7dbd0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
66565b59ed52e6808a087c575cf43e4becc5b02613139616036c833945a7dbd0
-
Size
671KB
-
MD5
25d76ecb756926a6a8a82525d5662b60
-
SHA1
63d9c06c727f1507db749f8882765d2842ba2646
-
SHA256
66565b59ed52e6808a087c575cf43e4becc5b02613139616036c833945a7dbd0
-
SHA512
2433c190f81bae6f75355b6dc25ba5f6d9404aa398a91a997201afe3e907698b386028d3e85423cc3eceb368da726198f44a4c3be13d5e57c9ed39eb334d95af
-
SSDEEP
12288:dMrqy90qzMkxKep9kzO0fgbeo++ks2odFq3LqcNnwkun84Uk3YLRT:DyTzMaozO0fHo3q3GcxW8YYR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1