General
-
Target
ad7ad47e3ef2176b4f11b9580d5f94a60a6c60aa234a086c027076f615bd9c07
-
Size
660KB
-
Sample
241106-khl9xsyrap
-
MD5
584809ae0cc9465ea87ef83c210cc599
-
SHA1
adcb10f82d095eb2d910499d2de2a80554e94d85
-
SHA256
ad7ad47e3ef2176b4f11b9580d5f94a60a6c60aa234a086c027076f615bd9c07
-
SHA512
64400867bb65f40b5092bea9f50432be9718174258028c2e8ae2acf491a489d347e2ca39964b1f3ad98823859d7753e1ec84b8acdc859d427ba774554ef0093b
-
SSDEEP
12288:xMr2y90pL1m4Qhnvv2ecjb7x6ThuIPZA5nCkt+BjGf5K+a/smI7nJh9CbfE:3y81xw32fpwuIC5Ckt+BCA8mILJfCbfE
Static task
static1
Behavioral task
behavioral1
Sample
ad7ad47e3ef2176b4f11b9580d5f94a60a6c60aa234a086c027076f615bd9c07.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ad7ad47e3ef2176b4f11b9580d5f94a60a6c60aa234a086c027076f615bd9c07
-
Size
660KB
-
MD5
584809ae0cc9465ea87ef83c210cc599
-
SHA1
adcb10f82d095eb2d910499d2de2a80554e94d85
-
SHA256
ad7ad47e3ef2176b4f11b9580d5f94a60a6c60aa234a086c027076f615bd9c07
-
SHA512
64400867bb65f40b5092bea9f50432be9718174258028c2e8ae2acf491a489d347e2ca39964b1f3ad98823859d7753e1ec84b8acdc859d427ba774554ef0093b
-
SSDEEP
12288:xMr2y90pL1m4Qhnvv2ecjb7x6ThuIPZA5nCkt+BjGf5K+a/smI7nJh9CbfE:3y81xw32fpwuIC5Ckt+BCA8mILJfCbfE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1