General
-
Target
968f84b3f448c11fab4f1c8a5b4b9362f862c2b74124a7163edc04b76a0abf76
-
Size
665KB
-
Sample
241110-16qv1swkg1
-
MD5
8b9ac4d1e2b4c7e87938373b5a76b87c
-
SHA1
a3451b8fe5c1fca437a1cb5b8de8e13030054974
-
SHA256
968f84b3f448c11fab4f1c8a5b4b9362f862c2b74124a7163edc04b76a0abf76
-
SHA512
082beb77eaa87ab7531f6762d8148436604854bba67f959a7780deadc78e5f2631f6a79e2ef19f2b3f3e31363563be08eff893cafcced2fc2eaffbc3d363a147
-
SSDEEP
12288:dMr+y90CUYrnf0aJ2ul74Ax/mesxYdEfTU8jGN/b2Xs4LRpjV4:jycG2Kx/mtxyyU8jGN/T4PjV4
Static task
static1
Behavioral task
behavioral1
Sample
968f84b3f448c11fab4f1c8a5b4b9362f862c2b74124a7163edc04b76a0abf76.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
968f84b3f448c11fab4f1c8a5b4b9362f862c2b74124a7163edc04b76a0abf76
-
Size
665KB
-
MD5
8b9ac4d1e2b4c7e87938373b5a76b87c
-
SHA1
a3451b8fe5c1fca437a1cb5b8de8e13030054974
-
SHA256
968f84b3f448c11fab4f1c8a5b4b9362f862c2b74124a7163edc04b76a0abf76
-
SHA512
082beb77eaa87ab7531f6762d8148436604854bba67f959a7780deadc78e5f2631f6a79e2ef19f2b3f3e31363563be08eff893cafcced2fc2eaffbc3d363a147
-
SSDEEP
12288:dMr+y90CUYrnf0aJ2ul74Ax/mesxYdEfTU8jGN/b2Xs4LRpjV4:jycG2Kx/mtxyyU8jGN/T4PjV4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1