General
-
Target
636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d
-
Size
789KB
-
Sample
241106-kkl2yawmas
-
MD5
f6d95f21151f32263ba36408e3da324f
-
SHA1
4f2b7f696309be88b39118d913052332842ab4f2
-
SHA256
636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d
-
SHA512
4c76e9355c735aca7020f34345525b9c20dd67f662ba0fa35eb43979ea1121082aec73e0e6352597736abaee920f9cbb9214202473f133707a75f521e6f9e11b
-
SSDEEP
12288:BMrey90KeMK/MS8zoZqBvMHrhRztEq3Ot9ud59cMSr41WM9XGXkNTqxI9l:fyHK/5MvahR885+Mm4YiJJXv
Static task
static1
Behavioral task
behavioral1
Sample
636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d
-
Size
789KB
-
MD5
f6d95f21151f32263ba36408e3da324f
-
SHA1
4f2b7f696309be88b39118d913052332842ab4f2
-
SHA256
636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d
-
SHA512
4c76e9355c735aca7020f34345525b9c20dd67f662ba0fa35eb43979ea1121082aec73e0e6352597736abaee920f9cbb9214202473f133707a75f521e6f9e11b
-
SSDEEP
12288:BMrey90KeMK/MS8zoZqBvMHrhRztEq3Ot9ud59cMSr41WM9XGXkNTqxI9l:fyHK/5MvahR885+Mm4YiJJXv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1