General
-
Target
d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5
-
Size
530KB
-
Sample
241106-vvy5cstlax
-
MD5
50c6ec906d6c84b92ecdce4be3bb2188
-
SHA1
f1b4194198e65eaa52a203f2b663f38692179c1b
-
SHA256
d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5
-
SHA512
69b15576567054edc6d52aedc43bcb119bd83d53a896ace94ebf6b44ca2798c851bb970b42c92a868a567dbcae63c0eccf580c0d46de9d0e3a10cc88b51622d8
-
SSDEEP
12288:dMrGy90vcBsIkGilWPlM7lj9YH8f5KXa/X44cRrhYzq:7yYcBvXPPs91AI44cRrhH
Static task
static1
Behavioral task
behavioral1
Sample
d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5
-
Size
530KB
-
MD5
50c6ec906d6c84b92ecdce4be3bb2188
-
SHA1
f1b4194198e65eaa52a203f2b663f38692179c1b
-
SHA256
d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5
-
SHA512
69b15576567054edc6d52aedc43bcb119bd83d53a896ace94ebf6b44ca2798c851bb970b42c92a868a567dbcae63c0eccf580c0d46de9d0e3a10cc88b51622d8
-
SSDEEP
12288:dMrGy90vcBsIkGilWPlM7lj9YH8f5KXa/X44cRrhYzq:7yYcBvXPPs91AI44cRrhH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1