General
-
Target
6830fc5dcf9b974d0c96b6dbcee325df991ac81340cdbd60c014ec98b6ad7331
-
Size
1002KB
-
Sample
241106-nh348aykhy
-
MD5
e33cc4fc27cdf3aaf71f35b242caf16b
-
SHA1
ab0b31184657896c41fb00255c0909cf65ae8b2d
-
SHA256
6830fc5dcf9b974d0c96b6dbcee325df991ac81340cdbd60c014ec98b6ad7331
-
SHA512
1d388de5806e96e7159867e8339e222cb2fa70210a73ef9fe68c21b7a8db428542ccf2c55edcaf7f4735d4fa13896ec9c1e2e13a2c9ed5cd213b345a417cd770
-
SSDEEP
24576:Ny57ZGbbYwPmKJcQ3v7IIERGLdUhENaw:obGUwuK5vEREUF
Static task
static1
Behavioral task
behavioral1
Sample
6830fc5dcf9b974d0c96b6dbcee325df991ac81340cdbd60c014ec98b6ad7331.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6830fc5dcf9b974d0c96b6dbcee325df991ac81340cdbd60c014ec98b6ad7331
-
Size
1002KB
-
MD5
e33cc4fc27cdf3aaf71f35b242caf16b
-
SHA1
ab0b31184657896c41fb00255c0909cf65ae8b2d
-
SHA256
6830fc5dcf9b974d0c96b6dbcee325df991ac81340cdbd60c014ec98b6ad7331
-
SHA512
1d388de5806e96e7159867e8339e222cb2fa70210a73ef9fe68c21b7a8db428542ccf2c55edcaf7f4735d4fa13896ec9c1e2e13a2c9ed5cd213b345a417cd770
-
SSDEEP
24576:Ny57ZGbbYwPmKJcQ3v7IIERGLdUhENaw:obGUwuK5vEREUF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1