General
-
Target
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
Size
689KB
-
Sample
241106-v365yaverp
-
MD5
5465949c610da7a6dffcb181a30108c7
-
SHA1
349e7e5f066439e47e532ae8cfa94c2d21c3c32a
-
SHA256
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
SHA512
cb9583c836e3ebdeb300099863a888f653294b19fda65c733e6d76589d915d60b78f50b5b62a7bc67d693733979bb51c3601a39f7679ffc657bae15fc8f52f89
-
SSDEEP
12288:AMr+y90G9Ju/IQox4fgZiyS65hLu4kDq0MSKI3Vq/d0K6LgquXvmFDyfig4A5/Ls:OyD9YQQou4ZvBfaY0LZ3Vq/uDLCXiDya
Static task
static1
Behavioral task
behavioral1
Sample
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
Size
689KB
-
MD5
5465949c610da7a6dffcb181a30108c7
-
SHA1
349e7e5f066439e47e532ae8cfa94c2d21c3c32a
-
SHA256
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
SHA512
cb9583c836e3ebdeb300099863a888f653294b19fda65c733e6d76589d915d60b78f50b5b62a7bc67d693733979bb51c3601a39f7679ffc657bae15fc8f52f89
-
SSDEEP
12288:AMr+y90G9Ju/IQox4fgZiyS65hLu4kDq0MSKI3Vq/d0K6LgquXvmFDyfig4A5/Ls:OyD9YQQou4ZvBfaY0LZ3Vq/uDLCXiDya
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1