General
-
Target
56551384d24d6fba8a58322c1504a31db4944d152823cd63c688770960707dc6
-
Size
698KB
-
Sample
241106-wv4khswapq
-
MD5
4452905ef8ed8986b3dffba622e38575
-
SHA1
70db64d334ff19851eec7b56fe3b7d5157448bdb
-
SHA256
56551384d24d6fba8a58322c1504a31db4944d152823cd63c688770960707dc6
-
SHA512
612cbca8dbc87f1d5ecccb782f6297834537cbabdb3e92e1d752bcd8facef7d2d74bdf274b223bbe1f2aee25fdddf6aed57978fcb889268aa703e18071047579
-
SSDEEP
12288:HMrhy90tXhxpEb0xd+YQBknQTvKHpdl69/ivZC0W0jqLdHAqOlA74Fgp:6y8XhxpRxAheJdl6tLLpugp
Static task
static1
Behavioral task
behavioral1
Sample
56551384d24d6fba8a58322c1504a31db4944d152823cd63c688770960707dc6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
56551384d24d6fba8a58322c1504a31db4944d152823cd63c688770960707dc6
-
Size
698KB
-
MD5
4452905ef8ed8986b3dffba622e38575
-
SHA1
70db64d334ff19851eec7b56fe3b7d5157448bdb
-
SHA256
56551384d24d6fba8a58322c1504a31db4944d152823cd63c688770960707dc6
-
SHA512
612cbca8dbc87f1d5ecccb782f6297834537cbabdb3e92e1d752bcd8facef7d2d74bdf274b223bbe1f2aee25fdddf6aed57978fcb889268aa703e18071047579
-
SSDEEP
12288:HMrhy90tXhxpEb0xd+YQBknQTvKHpdl69/ivZC0W0jqLdHAqOlA74Fgp:6y8XhxpRxAheJdl6tLLpugp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1