General
-
Target
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1
-
Size
659KB
-
Sample
241105-xdx7vawjew
-
MD5
66109d69f0c6330c7aa5d516691cab96
-
SHA1
cd5bbe16479f07bc6d4e691a045969286160039e
-
SHA256
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1
-
SHA512
d1be22f40035d1a8e0530b85c52c09d346fc3149e82464e3d9b4b399d0440bed9c7b71e31216b7a40a3ed0f0d0ea61b540aa82ae6514b3dc8c1ee9c5d27e0b3a
-
SSDEEP
12288:UMr8y90qrxKFoxAJujM7h/NN4sQd+4OKjq1WNf5KBa/Tm0TQxLbn2FH:gy/rxKOYEM7h/NNO04hjq1YAOm0kN2
Static task
static1
Behavioral task
behavioral1
Sample
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1
-
Size
659KB
-
MD5
66109d69f0c6330c7aa5d516691cab96
-
SHA1
cd5bbe16479f07bc6d4e691a045969286160039e
-
SHA256
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1
-
SHA512
d1be22f40035d1a8e0530b85c52c09d346fc3149e82464e3d9b4b399d0440bed9c7b71e31216b7a40a3ed0f0d0ea61b540aa82ae6514b3dc8c1ee9c5d27e0b3a
-
SSDEEP
12288:UMr8y90qrxKFoxAJujM7h/NN4sQd+4OKjq1WNf5KBa/Tm0TQxLbn2FH:gy/rxKOYEM7h/NNO04hjq1YAOm0kN2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1