General
-
Target
954182abeabc6fe1e13c31366caca7cc73f763f7ef5d69ed7ccd8d29398bb5d9
-
Size
658KB
-
Sample
241110-2bgjjaxbmc
-
MD5
30e3a90b44f1d80af3ed212771845be0
-
SHA1
64c520289014ad8bc97d225d8e31d7c21bca1628
-
SHA256
954182abeabc6fe1e13c31366caca7cc73f763f7ef5d69ed7ccd8d29398bb5d9
-
SHA512
64d8a5f2f2e75718900987fa524b5f3c5bd76e840bc0689ee2f322ced1d6ca7682d9611438c3971b547d8273112bf0b983c924dce1d6ffff157d4ab42559399d
-
SSDEEP
12288:6MrSy90i0fPBu/YMhR9PSrzMaLpBDP6xsGLi7U6DFcpBwdnyOfkVgoK:8yc3BQLRl0zVBQsDA6KBMRWY
Static task
static1
Behavioral task
behavioral1
Sample
954182abeabc6fe1e13c31366caca7cc73f763f7ef5d69ed7ccd8d29398bb5d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
954182abeabc6fe1e13c31366caca7cc73f763f7ef5d69ed7ccd8d29398bb5d9
-
Size
658KB
-
MD5
30e3a90b44f1d80af3ed212771845be0
-
SHA1
64c520289014ad8bc97d225d8e31d7c21bca1628
-
SHA256
954182abeabc6fe1e13c31366caca7cc73f763f7ef5d69ed7ccd8d29398bb5d9
-
SHA512
64d8a5f2f2e75718900987fa524b5f3c5bd76e840bc0689ee2f322ced1d6ca7682d9611438c3971b547d8273112bf0b983c924dce1d6ffff157d4ab42559399d
-
SSDEEP
12288:6MrSy90i0fPBu/YMhR9PSrzMaLpBDP6xsGLi7U6DFcpBwdnyOfkVgoK:8yc3BQLRl0zVBQsDA6KBMRWY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1