General
-
Target
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669
-
Size
658KB
-
Sample
241106-j2s15swjev
-
MD5
c6637cad71072dcd58d169d88f9f3302
-
SHA1
1fc79eac8edf17092be4e78601efeb4d2ff80b7f
-
SHA256
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669
-
SHA512
89a037a21bea5180607242e50dd1a9877f0a1d1694d04d054e6f6c09593e1099378a5bae077162bbda471857c1d84a9169785a5dd4ba4936756bf9292746b125
-
SSDEEP
12288:GMrMy90mI7y2w0x9WoDQIFSsntln1tonwborBmLt8QC6OmQ447zWKB68vl2uXvDb:uyahScbFBntt1mnhBmhK1m54mKkuXvP
Static task
static1
Behavioral task
behavioral1
Sample
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669
-
Size
658KB
-
MD5
c6637cad71072dcd58d169d88f9f3302
-
SHA1
1fc79eac8edf17092be4e78601efeb4d2ff80b7f
-
SHA256
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669
-
SHA512
89a037a21bea5180607242e50dd1a9877f0a1d1694d04d054e6f6c09593e1099378a5bae077162bbda471857c1d84a9169785a5dd4ba4936756bf9292746b125
-
SSDEEP
12288:GMrMy90mI7y2w0x9WoDQIFSsntln1tonwborBmLt8QC6OmQ447zWKB68vl2uXvDb:uyahScbFBntt1mnhBmhK1m54mKkuXvP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1