General
-
Target
96ebc199b9165eb905209c670fa6a7571d21856ee22078b45f74bbaae8f9e0b4
-
Size
522KB
-
Sample
241106-s64g4sskby
-
MD5
b61a53e8ee0a29db8430f28735c572a1
-
SHA1
aaae4e471a31266a9f96a235f2071f53043b8e42
-
SHA256
96ebc199b9165eb905209c670fa6a7571d21856ee22078b45f74bbaae8f9e0b4
-
SHA512
75ce1a46e3ff04088306a731bb59cf82f76a91148efe08eef753a2770cdd5d4f7463e53bd705e54bdf3dfde4e4d4c2e4a6406f5585876b7e8a0ed9e0091bfc93
-
SSDEEP
12288:bMrTy90PedpwsOKXcOnfd1nsT2Bg9hj6QtV98+:EyzwsOQ3PnsSBCx6+
Static task
static1
Behavioral task
behavioral1
Sample
96ebc199b9165eb905209c670fa6a7571d21856ee22078b45f74bbaae8f9e0b4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
96ebc199b9165eb905209c670fa6a7571d21856ee22078b45f74bbaae8f9e0b4
-
Size
522KB
-
MD5
b61a53e8ee0a29db8430f28735c572a1
-
SHA1
aaae4e471a31266a9f96a235f2071f53043b8e42
-
SHA256
96ebc199b9165eb905209c670fa6a7571d21856ee22078b45f74bbaae8f9e0b4
-
SHA512
75ce1a46e3ff04088306a731bb59cf82f76a91148efe08eef753a2770cdd5d4f7463e53bd705e54bdf3dfde4e4d4c2e4a6406f5585876b7e8a0ed9e0091bfc93
-
SSDEEP
12288:bMrTy90PedpwsOKXcOnfd1nsT2Bg9hj6QtV98+:EyzwsOQ3PnsSBCx6+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1