General
-
Target
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174
-
Size
694KB
-
Sample
241106-nyx8xasjfn
-
MD5
2ffd2c00d39ff9c7985070760ffcb848
-
SHA1
2504978caf38bebfd5ec4ae9a4f60fa8411464e4
-
SHA256
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174
-
SHA512
fdb9f64fa443907456c96034a2cb58b34a827871e0a9a89da8ef55b39644c4b071db9da18df597037614d415985c5656a82b000722ea04c303392f846f426ba1
-
SSDEEP
12288:SMrOy90LnUOiHXmHG0MENKXyaDzoq3qX+CTP5pV2ElZAipuTXA4ApmUU21PA:syInUN3mHjMgKXyOU//TPjjlRuDAHmU2
Static task
static1
Behavioral task
behavioral1
Sample
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174
-
Size
694KB
-
MD5
2ffd2c00d39ff9c7985070760ffcb848
-
SHA1
2504978caf38bebfd5ec4ae9a4f60fa8411464e4
-
SHA256
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174
-
SHA512
fdb9f64fa443907456c96034a2cb58b34a827871e0a9a89da8ef55b39644c4b071db9da18df597037614d415985c5656a82b000722ea04c303392f846f426ba1
-
SSDEEP
12288:SMrOy90LnUOiHXmHG0MENKXyaDzoq3qX+CTP5pV2ElZAipuTXA4ApmUU21PA:syInUN3mHjMgKXyOU//TPjjlRuDAHmU2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1