General
-
Target
6577a41390721769ecee7379259f3679e92913275d7fbd794fa33ed52203b904
-
Size
677KB
-
Sample
241110-13lrwswkbx
-
MD5
95bcd22e01cbce70798fbb3b3dba28de
-
SHA1
a36190f7b0da7e42feafa465af742045e585461c
-
SHA256
6577a41390721769ecee7379259f3679e92913275d7fbd794fa33ed52203b904
-
SHA512
68abb64d480625e9adc8dbb3b34c8f161762df9485c8a101d8c51e79d4bfd85a82e8d594b51ba1d64089c5fa953ecba87384f9d954d43db3e513edc08cc33712
-
SSDEEP
12288:DMr1y90lEqaqiT6je+x2UsavUxjvR1dE0l6enZ28j8mbbLk7nltCrrMt:KyGtFiAe+IacpzdnLnM8jY7TCrm
Static task
static1
Behavioral task
behavioral1
Sample
6577a41390721769ecee7379259f3679e92913275d7fbd794fa33ed52203b904.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
6577a41390721769ecee7379259f3679e92913275d7fbd794fa33ed52203b904
-
Size
677KB
-
MD5
95bcd22e01cbce70798fbb3b3dba28de
-
SHA1
a36190f7b0da7e42feafa465af742045e585461c
-
SHA256
6577a41390721769ecee7379259f3679e92913275d7fbd794fa33ed52203b904
-
SHA512
68abb64d480625e9adc8dbb3b34c8f161762df9485c8a101d8c51e79d4bfd85a82e8d594b51ba1d64089c5fa953ecba87384f9d954d43db3e513edc08cc33712
-
SSDEEP
12288:DMr1y90lEqaqiT6je+x2UsavUxjvR1dE0l6enZ28j8mbbLk7nltCrrMt:KyGtFiAe+IacpzdnLnM8jY7TCrm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1