General
-
Target
ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5
-
Size
530KB
-
Sample
241105-ymdp8swrcz
-
MD5
6e19cbb9314bb8ca324e7be15eb2f820
-
SHA1
6c59b38fb917f99d51cb7c9d174215bfa252aa47
-
SHA256
ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5
-
SHA512
8c20cccb15b770d256f7e7cf1c9a69984f4d6b51aab14305e4f672c2479a308dd62666735b867bf3939df77db2173ffb5eecf8523897eb1ca82e76e7474af16c
-
SSDEEP
12288:rMriy90XVHhwf/ADtTLZ8cf5KXa/+yN3nhHLYzK1+eoWFuh:pyIwnADlLrAxyN39LYmNfEh
Static task
static1
Behavioral task
behavioral1
Sample
ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5
-
Size
530KB
-
MD5
6e19cbb9314bb8ca324e7be15eb2f820
-
SHA1
6c59b38fb917f99d51cb7c9d174215bfa252aa47
-
SHA256
ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5
-
SHA512
8c20cccb15b770d256f7e7cf1c9a69984f4d6b51aab14305e4f672c2479a308dd62666735b867bf3939df77db2173ffb5eecf8523897eb1ca82e76e7474af16c
-
SSDEEP
12288:rMriy90XVHhwf/ADtTLZ8cf5KXa/+yN3nhHLYzK1+eoWFuh:pyIwnADlLrAxyN39LYmNfEh
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1