General
-
Target
6e2adcdd017bcb0b5752b1d6e465bcca0a70fa6ac3f5e4a78be72b4f8655e704
-
Size
534KB
-
Sample
241106-l6l5hazrgn
-
MD5
632e471b8dab30d7e6dbb5dd5192e40a
-
SHA1
2c79c7cb75412e46dd20a83039156976809ef45c
-
SHA256
6e2adcdd017bcb0b5752b1d6e465bcca0a70fa6ac3f5e4a78be72b4f8655e704
-
SHA512
f1fc364f02369adf70b775f73a7498d980a00f7d8e183fab0a5f243fa2679bd6b932c9a84190f9e818c995f51ecdedf3125b2f888f4e19c4b625cd7799970ac4
-
SSDEEP
12288:GMrey90uZ7TWd3eG1uIbHKpStpbL+N454K9wjvvg:Eyxu3LIsHrLu4mL3g
Static task
static1
Behavioral task
behavioral1
Sample
6e2adcdd017bcb0b5752b1d6e465bcca0a70fa6ac3f5e4a78be72b4f8655e704.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6e2adcdd017bcb0b5752b1d6e465bcca0a70fa6ac3f5e4a78be72b4f8655e704
-
Size
534KB
-
MD5
632e471b8dab30d7e6dbb5dd5192e40a
-
SHA1
2c79c7cb75412e46dd20a83039156976809ef45c
-
SHA256
6e2adcdd017bcb0b5752b1d6e465bcca0a70fa6ac3f5e4a78be72b4f8655e704
-
SHA512
f1fc364f02369adf70b775f73a7498d980a00f7d8e183fab0a5f243fa2679bd6b932c9a84190f9e818c995f51ecdedf3125b2f888f4e19c4b625cd7799970ac4
-
SSDEEP
12288:GMrey90uZ7TWd3eG1uIbHKpStpbL+N454K9wjvvg:Eyxu3LIsHrLu4mL3g
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1