General
-
Target
0ed6655cad6376a7de4f45cb4ed9b2c9c9759b6fef855ba9331903a230ae4bb1
-
Size
666KB
-
Sample
241106-lmgqnsxjgz
-
MD5
f05e89c4a9c304ec7330f0d61b558d0d
-
SHA1
606bda1cb4325c5aafbf2e58ef5e0f4e275b2b52
-
SHA256
0ed6655cad6376a7de4f45cb4ed9b2c9c9759b6fef855ba9331903a230ae4bb1
-
SHA512
a054353eb2f6f58c4204a09b7e7e291f0e655035881bfb4d6215feb88dc14cad26634f7b5ec37bf680bed075f5d7a8d2d63d7a5e4a0232d13575d391fcf4123e
-
SSDEEP
12288:GMr8y90ie6anowLcI7i4SWZG3SflEHrEmhbmpL7b5Ps5qmB:uyRe6anofI7i4StSfIrzhbmxdWqQ
Static task
static1
Behavioral task
behavioral1
Sample
0ed6655cad6376a7de4f45cb4ed9b2c9c9759b6fef855ba9331903a230ae4bb1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
0ed6655cad6376a7de4f45cb4ed9b2c9c9759b6fef855ba9331903a230ae4bb1
-
Size
666KB
-
MD5
f05e89c4a9c304ec7330f0d61b558d0d
-
SHA1
606bda1cb4325c5aafbf2e58ef5e0f4e275b2b52
-
SHA256
0ed6655cad6376a7de4f45cb4ed9b2c9c9759b6fef855ba9331903a230ae4bb1
-
SHA512
a054353eb2f6f58c4204a09b7e7e291f0e655035881bfb4d6215feb88dc14cad26634f7b5ec37bf680bed075f5d7a8d2d63d7a5e4a0232d13575d391fcf4123e
-
SSDEEP
12288:GMr8y90ie6anowLcI7i4SWZG3SflEHrEmhbmpL7b5Ps5qmB:uyRe6anofI7i4StSfIrzhbmxdWqQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1