General
-
Target
4d9c92cc564ac36991e9d2ed74ba4ca31a7b84cbdbcf505e39d558430b5a0679
-
Size
658KB
-
Sample
241106-r61ksavjfp
-
MD5
1ce4d9d15cd63afeb936a5f1c8e7c0a7
-
SHA1
ba8d7c6e0e904faeb1c7fbe85d5f27fcc767a146
-
SHA256
4d9c92cc564ac36991e9d2ed74ba4ca31a7b84cbdbcf505e39d558430b5a0679
-
SHA512
d50b480cf5a78e08da3ee1bff73567b8acb6a28f78a0f82da61d3c87256b499e8212f6f9216a3dc6fc518dd0de19a46881f4865e856fd49b24bf33bfc70544d6
-
SSDEEP
12288:EMrIy90AuPY7qRg7tU9ohUUhGchktfXYyj/RughW6whO3x9V+:UyzuPY7qRg5N9fuJXYqJuuW6tV+
Static task
static1
Behavioral task
behavioral1
Sample
4d9c92cc564ac36991e9d2ed74ba4ca31a7b84cbdbcf505e39d558430b5a0679.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4d9c92cc564ac36991e9d2ed74ba4ca31a7b84cbdbcf505e39d558430b5a0679
-
Size
658KB
-
MD5
1ce4d9d15cd63afeb936a5f1c8e7c0a7
-
SHA1
ba8d7c6e0e904faeb1c7fbe85d5f27fcc767a146
-
SHA256
4d9c92cc564ac36991e9d2ed74ba4ca31a7b84cbdbcf505e39d558430b5a0679
-
SHA512
d50b480cf5a78e08da3ee1bff73567b8acb6a28f78a0f82da61d3c87256b499e8212f6f9216a3dc6fc518dd0de19a46881f4865e856fd49b24bf33bfc70544d6
-
SSDEEP
12288:EMrIy90AuPY7qRg7tU9ohUUhGchktfXYyj/RughW6whO3x9V+:UyzuPY7qRg5N9fuJXYqJuuW6tV+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1