General
-
Target
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add
-
Size
530KB
-
Sample
241106-pzqe5azjgx
-
MD5
780eb5654894c821bc20a1a27691c2c6
-
SHA1
58cb12fcc4e6e313c30cf7471cecf7d73c72d73c
-
SHA256
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add
-
SHA512
897eddc130dd79d5fbbf0b9b719b73cc4624dc4b317b99b535cd10198beb93be51d8e65003aa5398f602d7269d1f05af911870ee2ff71d20506f78fdaa59d43d
-
SSDEEP
6144:Kpy+bnr+rp0yN90QEV6bVZ1QaGcP8MKghPLveRDBC3e9RZzxxEDwoxEJYvHxIr7C:HMrTy90m3+C8zGve/1ZzvE8oxBRuvMl
Static task
static1
Behavioral task
behavioral1
Sample
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add
-
Size
530KB
-
MD5
780eb5654894c821bc20a1a27691c2c6
-
SHA1
58cb12fcc4e6e313c30cf7471cecf7d73c72d73c
-
SHA256
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add
-
SHA512
897eddc130dd79d5fbbf0b9b719b73cc4624dc4b317b99b535cd10198beb93be51d8e65003aa5398f602d7269d1f05af911870ee2ff71d20506f78fdaa59d43d
-
SSDEEP
6144:Kpy+bnr+rp0yN90QEV6bVZ1QaGcP8MKghPLveRDBC3e9RZzxxEDwoxEJYvHxIr7C:HMrTy90m3+C8zGve/1ZzvE8oxBRuvMl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1