General
-
Target
1ff2877288709736e735f25f6c28bd2db59e85baa6a72cf1d4a5905e35a199b0
-
Size
537KB
-
Sample
241105-wh6jcaykcr
-
MD5
4e95c419e763e4245e0119d8e1d71952
-
SHA1
7796240699361903f5607802ac051b675035d698
-
SHA256
1ff2877288709736e735f25f6c28bd2db59e85baa6a72cf1d4a5905e35a199b0
-
SHA512
6c690a1f75c9b0d8f09cf83d87904e8e5ec53fdb3ecf4c61a59971308bf85a58066b61d0c6e62231505d19f358752e13093f8595cdca7f6811175ffc635d67d0
-
SSDEEP
12288:tMrHy90Tl8bR9ZMSo0QHfeLH9dI7brmx2QV37:uy66bjySo/o9O7v+T37
Static task
static1
Behavioral task
behavioral1
Sample
1ff2877288709736e735f25f6c28bd2db59e85baa6a72cf1d4a5905e35a199b0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
1ff2877288709736e735f25f6c28bd2db59e85baa6a72cf1d4a5905e35a199b0
-
Size
537KB
-
MD5
4e95c419e763e4245e0119d8e1d71952
-
SHA1
7796240699361903f5607802ac051b675035d698
-
SHA256
1ff2877288709736e735f25f6c28bd2db59e85baa6a72cf1d4a5905e35a199b0
-
SHA512
6c690a1f75c9b0d8f09cf83d87904e8e5ec53fdb3ecf4c61a59971308bf85a58066b61d0c6e62231505d19f358752e13093f8595cdca7f6811175ffc635d67d0
-
SSDEEP
12288:tMrHy90Tl8bR9ZMSo0QHfeLH9dI7brmx2QV37:uy66bjySo/o9O7v+T37
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1