General
-
Target
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5
-
Size
660KB
-
Sample
241106-v43txavanf
-
MD5
e60c6467a07ce705cc193474936f95f1
-
SHA1
239493ead8b53b1895f2eb9d7b7285830c8c0bdc
-
SHA256
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5
-
SHA512
6386985d9b26f78124f0bf079fe46a85673eda35c74ea1307f31f730732b1eb37336787b03f99b6c670aa24ead00cf94939be6c078769420b5038df1d1d9bb19
-
SSDEEP
12288:FMrly90DxoUNqrBINKpuPSYPIaevIJUaA7EUFwlRir0V3ifWe:4yXriyZYXuuUFF0tiOe
Static task
static1
Behavioral task
behavioral1
Sample
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5
-
Size
660KB
-
MD5
e60c6467a07ce705cc193474936f95f1
-
SHA1
239493ead8b53b1895f2eb9d7b7285830c8c0bdc
-
SHA256
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5
-
SHA512
6386985d9b26f78124f0bf079fe46a85673eda35c74ea1307f31f730732b1eb37336787b03f99b6c670aa24ead00cf94939be6c078769420b5038df1d1d9bb19
-
SSDEEP
12288:FMrly90DxoUNqrBINKpuPSYPIaevIJUaA7EUFwlRir0V3ifWe:4yXriyZYXuuUFF0tiOe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1