General
-
Target
90059478b7ddcee6771f5b06e565d4f2f6cdc2b7dd730db36dee73ba4b60eb05
-
Size
658KB
-
Sample
241106-kab4zsypgq
-
MD5
58bbb29c7eaf2d0b4fe3ba9fab60bc39
-
SHA1
31d3d0a0bdef185c7b2823df71d8c13c01f8e8bb
-
SHA256
90059478b7ddcee6771f5b06e565d4f2f6cdc2b7dd730db36dee73ba4b60eb05
-
SHA512
cb81d889075f06bc3377eefe5bbe6d6bee95b5ca445cb86d9e0642e26a067e08c3f10fd706554d6ea1801df0bde9a1087ccaf48ff963ad3017583a58601e4811
-
SSDEEP
12288:pMrYy901Q8bC3TNpNb0iiiciVc/dRTLdrttPHK0o0mR83:VyeQ82NpNgAV4PHD88
Static task
static1
Behavioral task
behavioral1
Sample
90059478b7ddcee6771f5b06e565d4f2f6cdc2b7dd730db36dee73ba4b60eb05.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
90059478b7ddcee6771f5b06e565d4f2f6cdc2b7dd730db36dee73ba4b60eb05
-
Size
658KB
-
MD5
58bbb29c7eaf2d0b4fe3ba9fab60bc39
-
SHA1
31d3d0a0bdef185c7b2823df71d8c13c01f8e8bb
-
SHA256
90059478b7ddcee6771f5b06e565d4f2f6cdc2b7dd730db36dee73ba4b60eb05
-
SHA512
cb81d889075f06bc3377eefe5bbe6d6bee95b5ca445cb86d9e0642e26a067e08c3f10fd706554d6ea1801df0bde9a1087ccaf48ff963ad3017583a58601e4811
-
SSDEEP
12288:pMrYy901Q8bC3TNpNb0iiiciVc/dRTLdrttPHK0o0mR83:VyeQ82NpNgAV4PHD88
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1