General
-
Target
7bcc83655765c1c625a27a60a0836958c5aaeeb34e6a325921dd467bac729eb7
-
Size
683KB
-
Sample
241106-nwv1rszbqd
-
MD5
965a6de8bbfbd843b3c9288d7c42b190
-
SHA1
9144e85c8010c4ba3c8875ec25c4da19995825d8
-
SHA256
7bcc83655765c1c625a27a60a0836958c5aaeeb34e6a325921dd467bac729eb7
-
SHA512
ecae0bd6c531f2025d4bd36f3312a57c40c6f191dae32a3a19da2023c47c2b096be0a1ce6eba59cee3c058358198d6f5629858342cb5577d579c247ff49508f0
-
SSDEEP
12288:wMr/Ky90t6qQFiqknx38LAbpzeV0y2yUx3vUFEmcL+pp8q:fKyg67gF38oaay2yURv3mcLCmq
Static task
static1
Behavioral task
behavioral1
Sample
7bcc83655765c1c625a27a60a0836958c5aaeeb34e6a325921dd467bac729eb7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7bcc83655765c1c625a27a60a0836958c5aaeeb34e6a325921dd467bac729eb7
-
Size
683KB
-
MD5
965a6de8bbfbd843b3c9288d7c42b190
-
SHA1
9144e85c8010c4ba3c8875ec25c4da19995825d8
-
SHA256
7bcc83655765c1c625a27a60a0836958c5aaeeb34e6a325921dd467bac729eb7
-
SHA512
ecae0bd6c531f2025d4bd36f3312a57c40c6f191dae32a3a19da2023c47c2b096be0a1ce6eba59cee3c058358198d6f5629858342cb5577d579c247ff49508f0
-
SSDEEP
12288:wMr/Ky90t6qQFiqknx38LAbpzeV0y2yUx3vUFEmcL+pp8q:fKyg67gF38oaay2yURv3mcLCmq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1