General
-
Target
ccdd490efeb35056061c855c0aebc1e0558f9352683ced33420e9d10e3669095
-
Size
529KB
-
Sample
241105-wgdryayjhp
-
MD5
a1d1e27084cb33986255d6b822ec04bb
-
SHA1
bed62727c2a82e267b886c6d10278dff9d9f4d98
-
SHA256
ccdd490efeb35056061c855c0aebc1e0558f9352683ced33420e9d10e3669095
-
SHA512
a1b65073fa3f7ebee3c5f850ea7edccf051779d1ab9ca8bee81f2af4796944347daadeaa8dd9972de37d1075356bb7fdcc2ff9f045bc811866a69d701c8da94d
-
SSDEEP
12288:YMrOy900VpZ2H+lJ0O6jX2FzeQOl1Uw/91LT:GyBg40OtxLOl1pl1LT
Static task
static1
Behavioral task
behavioral1
Sample
ccdd490efeb35056061c855c0aebc1e0558f9352683ced33420e9d10e3669095.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ccdd490efeb35056061c855c0aebc1e0558f9352683ced33420e9d10e3669095
-
Size
529KB
-
MD5
a1d1e27084cb33986255d6b822ec04bb
-
SHA1
bed62727c2a82e267b886c6d10278dff9d9f4d98
-
SHA256
ccdd490efeb35056061c855c0aebc1e0558f9352683ced33420e9d10e3669095
-
SHA512
a1b65073fa3f7ebee3c5f850ea7edccf051779d1ab9ca8bee81f2af4796944347daadeaa8dd9972de37d1075356bb7fdcc2ff9f045bc811866a69d701c8da94d
-
SSDEEP
12288:YMrOy900VpZ2H+lJ0O6jX2FzeQOl1Uw/91LT:GyBg40OtxLOl1pl1LT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1