General
-
Target
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
Size
666KB
-
Sample
241106-r78msa1ndy
-
MD5
e879691309289faacbd504ff59710bd5
-
SHA1
1964a5ce2f610a87a9e9715fd1e045d20999e4fe
-
SHA256
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
SHA512
fbc35127224800b7cf411d62d2b9db23559fe7a7fdddff4fa8bf9ee50ce304d081541cf692635acf50a9ca617dc88058880fd6816d0356b7b73537ff076637b6
-
SSDEEP
12288:YMrmy90i6lwAsnTNjNuUXE6i7mKrH4TSapjOhhrUqjH/wBBrL04V:uy56CLnTGUjrKrH4TihhrDfwBBrLf
Static task
static1
Behavioral task
behavioral1
Sample
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
Size
666KB
-
MD5
e879691309289faacbd504ff59710bd5
-
SHA1
1964a5ce2f610a87a9e9715fd1e045d20999e4fe
-
SHA256
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
SHA512
fbc35127224800b7cf411d62d2b9db23559fe7a7fdddff4fa8bf9ee50ce304d081541cf692635acf50a9ca617dc88058880fd6816d0356b7b73537ff076637b6
-
SSDEEP
12288:YMrmy90i6lwAsnTNjNuUXE6i7mKrH4TSapjOhhrUqjH/wBBrL04V:uy56CLnTGUjrKrH4TihhrDfwBBrLf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1