General
-
Target
dfb586635e9c6ca3e720a8c0d03e4b461b0355ec1cf731273c745be867d2a718
-
Size
690KB
-
Sample
241106-mqtp3s1lgk
-
MD5
3643170e595aafee5f5f53ca310201ba
-
SHA1
d1120b281dfbd43cd4c8e08cc31a62b471968e06
-
SHA256
dfb586635e9c6ca3e720a8c0d03e4b461b0355ec1cf731273c745be867d2a718
-
SHA512
d568681ec2ef885225c91265e83170f9af2f630c778cecc55b4bc11dc10dfa64335e6a1e2619d7913cdb5ae1864387616b90bae1dfbf36235c846babf0209127
-
SSDEEP
12288:UMrGy90N2h3TrhoFO21o6cgNZ8aaN+jkhEI5NuIfJ+gDEq6Jev6LffnHPSkd:iyj1rhUA658vN+0EqNuQsgDEqZ6LfHbd
Static task
static1
Behavioral task
behavioral1
Sample
dfb586635e9c6ca3e720a8c0d03e4b461b0355ec1cf731273c745be867d2a718.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
dfb586635e9c6ca3e720a8c0d03e4b461b0355ec1cf731273c745be867d2a718
-
Size
690KB
-
MD5
3643170e595aafee5f5f53ca310201ba
-
SHA1
d1120b281dfbd43cd4c8e08cc31a62b471968e06
-
SHA256
dfb586635e9c6ca3e720a8c0d03e4b461b0355ec1cf731273c745be867d2a718
-
SHA512
d568681ec2ef885225c91265e83170f9af2f630c778cecc55b4bc11dc10dfa64335e6a1e2619d7913cdb5ae1864387616b90bae1dfbf36235c846babf0209127
-
SSDEEP
12288:UMrGy90N2h3TrhoFO21o6cgNZ8aaN+jkhEI5NuIfJ+gDEq6Jev6LffnHPSkd:iyj1rhUA658vN+0EqNuQsgDEqZ6LfHbd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1