General
-
Target
76dc1d69b79021f79d567ae5345240fdd88fda1b16b068a4d6e3d3b9fde91268
-
Size
690KB
-
Sample
241106-kzml1sxgrl
-
MD5
308576662f170316f089df9c66ad5faf
-
SHA1
ed00c085862e96b63cb820bc018f7dba57040902
-
SHA256
76dc1d69b79021f79d567ae5345240fdd88fda1b16b068a4d6e3d3b9fde91268
-
SHA512
39bbdde0757645d9b2da1ce0b6e8f6b6863abe512229fe357d2ea7258d771084964480b353c4816588db90ede4646c4738ecde40f6652a020a14183d720733b8
-
SSDEEP
12288:dMroy90e8JpqR9eSh2QYF16oD5KtTa8aAYo/A/iO37vBvvFr7figcbnXl9XA:tyaqh2tD4mFiO37pFr7agcXPQ
Static task
static1
Behavioral task
behavioral1
Sample
76dc1d69b79021f79d567ae5345240fdd88fda1b16b068a4d6e3d3b9fde91268.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
76dc1d69b79021f79d567ae5345240fdd88fda1b16b068a4d6e3d3b9fde91268
-
Size
690KB
-
MD5
308576662f170316f089df9c66ad5faf
-
SHA1
ed00c085862e96b63cb820bc018f7dba57040902
-
SHA256
76dc1d69b79021f79d567ae5345240fdd88fda1b16b068a4d6e3d3b9fde91268
-
SHA512
39bbdde0757645d9b2da1ce0b6e8f6b6863abe512229fe357d2ea7258d771084964480b353c4816588db90ede4646c4738ecde40f6652a020a14183d720733b8
-
SSDEEP
12288:dMroy90e8JpqR9eSh2QYF16oD5KtTa8aAYo/A/iO37vBvvFr7figcbnXl9XA:tyaqh2tD4mFiO37pFr7agcXPQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1