General
-
Target
68d666db157e49dbe4af1440b3dc31e60026fd676f4bab0d51f9a00008aae18d
-
Size
988KB
-
Sample
241106-j9dleswhkf
-
MD5
4794dee0c481fa08d74badecb047716d
-
SHA1
6b81a456a2ff4e484432b7e0b98987f3eff55685
-
SHA256
68d666db157e49dbe4af1440b3dc31e60026fd676f4bab0d51f9a00008aae18d
-
SHA512
9c011f15ff595798f76781b449ea675449d14e19d47141c548df71d21fa7ebcb6c1bee2bf001fd7f96af565ae3af82f7153c12c34c6457ec4d29dcf45f9288f2
-
SSDEEP
24576:UywBdWLZMSj+N1M1L3vvUR/aDEkgpMxJxNtUyawU8ti:jw7KMSj+N1q3v0a7gp+xNGyVUA
Static task
static1
Behavioral task
behavioral1
Sample
68d666db157e49dbe4af1440b3dc31e60026fd676f4bab0d51f9a00008aae18d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
68d666db157e49dbe4af1440b3dc31e60026fd676f4bab0d51f9a00008aae18d
-
Size
988KB
-
MD5
4794dee0c481fa08d74badecb047716d
-
SHA1
6b81a456a2ff4e484432b7e0b98987f3eff55685
-
SHA256
68d666db157e49dbe4af1440b3dc31e60026fd676f4bab0d51f9a00008aae18d
-
SHA512
9c011f15ff595798f76781b449ea675449d14e19d47141c548df71d21fa7ebcb6c1bee2bf001fd7f96af565ae3af82f7153c12c34c6457ec4d29dcf45f9288f2
-
SSDEEP
24576:UywBdWLZMSj+N1M1L3vvUR/aDEkgpMxJxNtUyawU8ti:jw7KMSj+N1q3v0a7gp+xNGyVUA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1