General
-
Target
c506e6132c0ceca89e6e80b60c5bd0d9b3b0f0fd081dc552e026ec91d860c1bd
-
Size
534KB
-
Sample
241106-ksnkqsxcld
-
MD5
bebd3c09420a4190473fb9296cb16292
-
SHA1
fc793bd8526ed68a10bb2537daaaf602507c1c17
-
SHA256
c506e6132c0ceca89e6e80b60c5bd0d9b3b0f0fd081dc552e026ec91d860c1bd
-
SHA512
2b9bed9f7011c671f59f2d25b9c6005d0596d550bb23d657030589aeb22fa4f3b394a5baf4a7443da844d49be434b5d41d7cd0aec3202b71f9cb6fd286bf6e16
-
SSDEEP
6144:KTy+bnr+wp0yN90QEoOhzGWv8bD5xgZiImez4I5UOObwfu7+poCmeBfWRPb0JbwS:ZMr4y902IG2QGzz+bwWWotDG
Static task
static1
Behavioral task
behavioral1
Sample
c506e6132c0ceca89e6e80b60c5bd0d9b3b0f0fd081dc552e026ec91d860c1bd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c506e6132c0ceca89e6e80b60c5bd0d9b3b0f0fd081dc552e026ec91d860c1bd
-
Size
534KB
-
MD5
bebd3c09420a4190473fb9296cb16292
-
SHA1
fc793bd8526ed68a10bb2537daaaf602507c1c17
-
SHA256
c506e6132c0ceca89e6e80b60c5bd0d9b3b0f0fd081dc552e026ec91d860c1bd
-
SHA512
2b9bed9f7011c671f59f2d25b9c6005d0596d550bb23d657030589aeb22fa4f3b394a5baf4a7443da844d49be434b5d41d7cd0aec3202b71f9cb6fd286bf6e16
-
SSDEEP
6144:KTy+bnr+wp0yN90QEoOhzGWv8bD5xgZiImez4I5UOObwfu7+poCmeBfWRPb0JbwS:ZMr4y902IG2QGzz+bwWWotDG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1