General
-
Target
64e5e5ae17217a37d0f8aa7b1b800bc2f620b45e04ba9c1fbd5d0dc40cd6d648
-
Size
658KB
-
Sample
241106-jwg2pavrex
-
MD5
d6086f1fa109dd7bd45410bb88a7d2cc
-
SHA1
3506def7782316d8bab46c6ce9ee5ea73861991c
-
SHA256
64e5e5ae17217a37d0f8aa7b1b800bc2f620b45e04ba9c1fbd5d0dc40cd6d648
-
SHA512
c5fcd92dd60e7a160b1ee1b8bac3676cd4f82dfe2c62ea55fcaff0673cc73f6cd6ce6d7266124d5db7591cfce708f970d140665be86f7b4c27dc66c97bd8b4e1
-
SSDEEP
12288:jMrsy90jsDrvBSl+Mdl2O+u8XfvPE9FXXV/KjpQoqBiWu9JNNiLxpU:byTDrvuXyBXf3KnolQDLubNQU
Static task
static1
Behavioral task
behavioral1
Sample
64e5e5ae17217a37d0f8aa7b1b800bc2f620b45e04ba9c1fbd5d0dc40cd6d648.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
64e5e5ae17217a37d0f8aa7b1b800bc2f620b45e04ba9c1fbd5d0dc40cd6d648
-
Size
658KB
-
MD5
d6086f1fa109dd7bd45410bb88a7d2cc
-
SHA1
3506def7782316d8bab46c6ce9ee5ea73861991c
-
SHA256
64e5e5ae17217a37d0f8aa7b1b800bc2f620b45e04ba9c1fbd5d0dc40cd6d648
-
SHA512
c5fcd92dd60e7a160b1ee1b8bac3676cd4f82dfe2c62ea55fcaff0673cc73f6cd6ce6d7266124d5db7591cfce708f970d140665be86f7b4c27dc66c97bd8b4e1
-
SSDEEP
12288:jMrsy90jsDrvBSl+Mdl2O+u8XfvPE9FXXV/KjpQoqBiWu9JNNiLxpU:byTDrvuXyBXf3KnolQDLubNQU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1