General
-
Target
80d6e302066d3efe86cb299efbbd44e840799e20c93ca2a0ee79b809c58f1376
-
Size
658KB
-
Sample
241106-j52gpawjhv
-
MD5
5a7e7927a0a6a6cfff839021df97f094
-
SHA1
d1bdbdbb66b0ea33123bb67fd9803345683656d5
-
SHA256
80d6e302066d3efe86cb299efbbd44e840799e20c93ca2a0ee79b809c58f1376
-
SHA512
ef4148ea3c3f9b1d2be334605e7f59a204819f44a22fdde107d25d759a4abb4e30a2f5bcabb8df99c7c40aeb6cece7a4396c1f64ebd08031be7eb70ab08f950c
-
SSDEEP
12288:7Mray90II/7ba2WoutyhoQToGuYjrYWMSKpUQ44QzWKjE8vSvK:ZyKnYltiVkdYjECyU54ZKL
Static task
static1
Behavioral task
behavioral1
Sample
80d6e302066d3efe86cb299efbbd44e840799e20c93ca2a0ee79b809c58f1376.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
80d6e302066d3efe86cb299efbbd44e840799e20c93ca2a0ee79b809c58f1376
-
Size
658KB
-
MD5
5a7e7927a0a6a6cfff839021df97f094
-
SHA1
d1bdbdbb66b0ea33123bb67fd9803345683656d5
-
SHA256
80d6e302066d3efe86cb299efbbd44e840799e20c93ca2a0ee79b809c58f1376
-
SHA512
ef4148ea3c3f9b1d2be334605e7f59a204819f44a22fdde107d25d759a4abb4e30a2f5bcabb8df99c7c40aeb6cece7a4396c1f64ebd08031be7eb70ab08f950c
-
SSDEEP
12288:7Mray90II/7ba2WoutyhoQToGuYjrYWMSKpUQ44QzWKjE8vSvK:ZyKnYltiVkdYjECyU54ZKL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1