General
-
Target
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094
-
Size
689KB
-
Sample
241106-mm4qwayhkm
-
MD5
37c146a1dac773ac2e17dd982ab5b66f
-
SHA1
fbee4337e2446c21f7d320e8c02964ab9316c335
-
SHA256
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094
-
SHA512
6140831c77fe0c88ed48d16a7a98537492fc7c87bde8a4004a8ff454ceaa00c973816e43040d047363224fafed493f5bcb3cbbdad7f6bf98e60b02567d5a24ad
-
SSDEEP
12288:/Mrey90eGG8XEe8CMUIt3gp0+ye65hLuCq1F7LjpgDRJ6R6v4F5WfigkJ9nA4:dyhGGWEe2HiK7FfaRfyDJA5Wage9A4
Static task
static1
Behavioral task
behavioral1
Sample
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094
-
Size
689KB
-
MD5
37c146a1dac773ac2e17dd982ab5b66f
-
SHA1
fbee4337e2446c21f7d320e8c02964ab9316c335
-
SHA256
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094
-
SHA512
6140831c77fe0c88ed48d16a7a98537492fc7c87bde8a4004a8ff454ceaa00c973816e43040d047363224fafed493f5bcb3cbbdad7f6bf98e60b02567d5a24ad
-
SSDEEP
12288:/Mrey90eGG8XEe8CMUIt3gp0+ye65hLuCq1F7LjpgDRJ6R6v4F5WfigkJ9nA4:dyhGGWEe2HiK7FfaRfyDJA5Wage9A4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1