General
-
Target
59eec0fd3d5de9c558a2cee6de22144399b0528a53645c8217053c14bfede487
-
Size
666KB
-
Sample
241105-wy8cwavpg1
-
MD5
1b9acc26ec5126aab72b3dc7ce0a4a7d
-
SHA1
527ec57e06da209eebd75eb22f59d18626fa341c
-
SHA256
59eec0fd3d5de9c558a2cee6de22144399b0528a53645c8217053c14bfede487
-
SHA512
bf946f9d162d9aea6a354f13470d5edb9d2ccb9307b0e4ec6ffccd61060a757860b8a1242312c46fade9d38000ec760af208cd26989497941f2235a37d08d978
-
SSDEEP
12288:3Mrmy906CM1cH2Q3OrIy1B2tW3a88AGALrUMpo/wCERjlGl:JyhlW2pXqWGCrfGwThlGl
Static task
static1
Behavioral task
behavioral1
Sample
59eec0fd3d5de9c558a2cee6de22144399b0528a53645c8217053c14bfede487.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
59eec0fd3d5de9c558a2cee6de22144399b0528a53645c8217053c14bfede487
-
Size
666KB
-
MD5
1b9acc26ec5126aab72b3dc7ce0a4a7d
-
SHA1
527ec57e06da209eebd75eb22f59d18626fa341c
-
SHA256
59eec0fd3d5de9c558a2cee6de22144399b0528a53645c8217053c14bfede487
-
SHA512
bf946f9d162d9aea6a354f13470d5edb9d2ccb9307b0e4ec6ffccd61060a757860b8a1242312c46fade9d38000ec760af208cd26989497941f2235a37d08d978
-
SSDEEP
12288:3Mrmy906CM1cH2Q3OrIy1B2tW3a88AGALrUMpo/wCERjlGl:JyhlW2pXqWGCrfGwThlGl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1