General
-
Target
f6f7d61593a0e91759468b3c36041c22e58a408b5f8577797f941186dfa52a87
-
Size
666KB
-
Sample
241106-r1nc9s1mey
-
MD5
4a2c603519a5f7b113b19d9309a4eeb3
-
SHA1
332b46b33202c54c1743aebcdc2132912855e66a
-
SHA256
f6f7d61593a0e91759468b3c36041c22e58a408b5f8577797f941186dfa52a87
-
SHA512
e1553321913b894e205ecc83af1540a4e8a716eedda0dbae057aa497d1e87d9a07ed4a20d1f6d80887cd83b059e314b9c578745b92172ff49a2dedc70c221099
-
SSDEEP
12288:IMrUy900hN7M8jvwRqV6Qk6YQ++d42YaTU9ZhrUSPt/wWsFz:My/hVM8jWqJrYQt42Ys0rHRwWO
Static task
static1
Behavioral task
behavioral1
Sample
f6f7d61593a0e91759468b3c36041c22e58a408b5f8577797f941186dfa52a87.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f6f7d61593a0e91759468b3c36041c22e58a408b5f8577797f941186dfa52a87
-
Size
666KB
-
MD5
4a2c603519a5f7b113b19d9309a4eeb3
-
SHA1
332b46b33202c54c1743aebcdc2132912855e66a
-
SHA256
f6f7d61593a0e91759468b3c36041c22e58a408b5f8577797f941186dfa52a87
-
SHA512
e1553321913b894e205ecc83af1540a4e8a716eedda0dbae057aa497d1e87d9a07ed4a20d1f6d80887cd83b059e314b9c578745b92172ff49a2dedc70c221099
-
SSDEEP
12288:IMrUy900hN7M8jvwRqV6Qk6YQ++d42YaTU9ZhrUSPt/wWsFz:My/hVM8jWqJrYQt42Ys0rHRwWO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1