General
-
Target
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31
-
Size
659KB
-
Sample
241106-vxczxathnc
-
MD5
0b33bce84f3ec390908f178adba51848
-
SHA1
bcbe03ca375e1a0e162888d2842afb8afe488269
-
SHA256
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31
-
SHA512
f1229c65a0a41e15bc83022e32694a3a9b67ab9f0e0b859aa04a05ce3c64014a0d2fdf4464b2fcb2d69f7527064211d25822583d948b45c2300699681392c46c
-
SSDEEP
12288:gMrey90sz6R45RK788ETnrPvgCJgLIBdD+XwQKjdQoqBiyn0LIx+N5:uyRz6RT4pnHJII/M4JQDz0LIc5
Static task
static1
Behavioral task
behavioral1
Sample
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31
-
Size
659KB
-
MD5
0b33bce84f3ec390908f178adba51848
-
SHA1
bcbe03ca375e1a0e162888d2842afb8afe488269
-
SHA256
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31
-
SHA512
f1229c65a0a41e15bc83022e32694a3a9b67ab9f0e0b859aa04a05ce3c64014a0d2fdf4464b2fcb2d69f7527064211d25822583d948b45c2300699681392c46c
-
SSDEEP
12288:gMrey90sz6R45RK788ETnrPvgCJgLIBdD+XwQKjdQoqBiyn0LIx+N5:uyRz6RT4pnHJII/M4JQDz0LIc5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1