General
-
Target
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f
-
Size
674KB
-
Sample
241106-k6kq1azlhq
-
MD5
741980ed3bdb4aaaa6adcf532c7f7f94
-
SHA1
e6959287f0e78c0d92de627515bba877437f383b
-
SHA256
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f
-
SHA512
c16c5b648e672fcde1c9272d8e3d88a0fd2520db30352383421aaa33d7271e6da2535931ad9a43afc8cb9da9dacbc43e941e4353a5449b807602be2b2cb897a8
-
SSDEEP
12288:IMrEy90q0/3JLb139mdmkIXWglBgF4j/De8EObmrWmY4TnlI/yXzq:cyPaJlNmmnGgLgF42obx14Lm/yG
Static task
static1
Behavioral task
behavioral1
Sample
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f
-
Size
674KB
-
MD5
741980ed3bdb4aaaa6adcf532c7f7f94
-
SHA1
e6959287f0e78c0d92de627515bba877437f383b
-
SHA256
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f
-
SHA512
c16c5b648e672fcde1c9272d8e3d88a0fd2520db30352383421aaa33d7271e6da2535931ad9a43afc8cb9da9dacbc43e941e4353a5449b807602be2b2cb897a8
-
SSDEEP
12288:IMrEy90q0/3JLb139mdmkIXWglBgF4j/De8EObmrWmY4TnlI/yXzq:cyPaJlNmmnGgLgF42obx14Lm/yG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1