General
-
Target
6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9
-
Size
537KB
-
Sample
241106-nn6gjaylfy
-
MD5
bba95ed00397c01db4d0e4c0d5754375
-
SHA1
6b94bf3d32f276eb36f62b08b62c2ebc19c3c2d9
-
SHA256
6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9
-
SHA512
d5059e8a74659ac592f80a8204a48096c82db0eb2b6c99d2d9c05da3baebe6ee686be14c9370634ba0af41d4dfb6d97a9fc7f66f79bdcbd5d2a29f9c05f5a747
-
SSDEEP
12288:QMrqy90K3yWET9WQ9L6wk2Bpe66LdZpNUIzH5wR4Cq5EJzzkN:qyz3AT9WOd0LdTN1ZwRiWJzzK
Static task
static1
Behavioral task
behavioral1
Sample
6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9
-
Size
537KB
-
MD5
bba95ed00397c01db4d0e4c0d5754375
-
SHA1
6b94bf3d32f276eb36f62b08b62c2ebc19c3c2d9
-
SHA256
6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9
-
SHA512
d5059e8a74659ac592f80a8204a48096c82db0eb2b6c99d2d9c05da3baebe6ee686be14c9370634ba0af41d4dfb6d97a9fc7f66f79bdcbd5d2a29f9c05f5a747
-
SSDEEP
12288:QMrqy90K3yWET9WQ9L6wk2Bpe66LdZpNUIzH5wR4Cq5EJzzkN:qyz3AT9WOd0LdTN1ZwRiWJzzK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1