General
-
Target
989d5cbf4c5f818f2ac0b18719c54a5d9bde41f135291c3cf6426a1cd78ab160
-
Size
523KB
-
Sample
241106-mjx4xsxpfw
-
MD5
63041526957982b4752aaa8ad23abeb7
-
SHA1
1a63886a30e3dbcf682c510bc13a73bf861ac29c
-
SHA256
989d5cbf4c5f818f2ac0b18719c54a5d9bde41f135291c3cf6426a1cd78ab160
-
SHA512
d01b734d16e997fabfb03a50deb552e49b4ca9654a7afccf39e3dde4a4ebff81e2cfd9a0c420c390e19ef9cad1f66f601a58ced40458436cb9071a362cfd0d26
-
SSDEEP
12288:qMrny90m3tZ+5tbyIlwr9xhDUVFFWaKREHs:1yfy5JyKwrTxWFUaKF
Static task
static1
Behavioral task
behavioral1
Sample
989d5cbf4c5f818f2ac0b18719c54a5d9bde41f135291c3cf6426a1cd78ab160.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
989d5cbf4c5f818f2ac0b18719c54a5d9bde41f135291c3cf6426a1cd78ab160
-
Size
523KB
-
MD5
63041526957982b4752aaa8ad23abeb7
-
SHA1
1a63886a30e3dbcf682c510bc13a73bf861ac29c
-
SHA256
989d5cbf4c5f818f2ac0b18719c54a5d9bde41f135291c3cf6426a1cd78ab160
-
SHA512
d01b734d16e997fabfb03a50deb552e49b4ca9654a7afccf39e3dde4a4ebff81e2cfd9a0c420c390e19ef9cad1f66f601a58ced40458436cb9071a362cfd0d26
-
SSDEEP
12288:qMrny90m3tZ+5tbyIlwr9xhDUVFFWaKREHs:1yfy5JyKwrTxWFUaKF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1