General
-
Target
c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98
-
Size
690KB
-
Sample
241105-y25ghaydlr
-
MD5
284449c77de8fea6f5dec4921747ae79
-
SHA1
7b7508a34ac37752dff9547c0652933395a4d3f1
-
SHA256
c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98
-
SHA512
5ca9451b8997dc2c6bef86564a84425679e209578e35c571330d65f001ad40943f561b18e88994b06c812b91afaccbf908543faba83c6c010c18dfb3b1ba61a5
-
SSDEEP
12288:iMrAy90ySr1MSCMzdrUxcpHd3YHr5aDfqHKQV6zWhOy2aMC4:mygaqpd3YL5G2KGyWple
Static task
static1
Behavioral task
behavioral1
Sample
c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98
-
Size
690KB
-
MD5
284449c77de8fea6f5dec4921747ae79
-
SHA1
7b7508a34ac37752dff9547c0652933395a4d3f1
-
SHA256
c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98
-
SHA512
5ca9451b8997dc2c6bef86564a84425679e209578e35c571330d65f001ad40943f561b18e88994b06c812b91afaccbf908543faba83c6c010c18dfb3b1ba61a5
-
SSDEEP
12288:iMrAy90ySr1MSCMzdrUxcpHd3YHr5aDfqHKQV6zWhOy2aMC4:mygaqpd3YL5G2KGyWple
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1