General
-
Target
ace7b86c3b76269378a0437f96be3ad486162444c88e0098a00c558902c6beb5
-
Size
661KB
-
Sample
241106-adjccstqhk
-
MD5
920115a56b02175bf3ce3b0f1c0d104d
-
SHA1
6f794b7402ae463e98f31f0b9932009e67bd30ac
-
SHA256
ace7b86c3b76269378a0437f96be3ad486162444c88e0098a00c558902c6beb5
-
SHA512
21cc85a11673e6fc4d4db1432311d9c116f32568082910a054b06631c6156f293c3f4fc9aef35394c2bbfb24bc001b752ed298d2ef42ede8966163de48029f81
-
SSDEEP
12288:uMrRy90TXtfk0/9OJ/h6sTQ4KRpE94iMsW3aFYbeof5vea/kmyQFnBaIjlG:Ty6dnVn5a4nBKIhUmy4c6Q
Static task
static1
Behavioral task
behavioral1
Sample
ace7b86c3b76269378a0437f96be3ad486162444c88e0098a00c558902c6beb5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ace7b86c3b76269378a0437f96be3ad486162444c88e0098a00c558902c6beb5
-
Size
661KB
-
MD5
920115a56b02175bf3ce3b0f1c0d104d
-
SHA1
6f794b7402ae463e98f31f0b9932009e67bd30ac
-
SHA256
ace7b86c3b76269378a0437f96be3ad486162444c88e0098a00c558902c6beb5
-
SHA512
21cc85a11673e6fc4d4db1432311d9c116f32568082910a054b06631c6156f293c3f4fc9aef35394c2bbfb24bc001b752ed298d2ef42ede8966163de48029f81
-
SSDEEP
12288:uMrRy90TXtfk0/9OJ/h6sTQ4KRpE94iMsW3aFYbeof5vea/kmyQFnBaIjlG:Ty6dnVn5a4nBKIhUmy4c6Q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1