General
-
Target
0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd.exe
-
Size
307KB
-
Sample
241110-2gn6kawmcw
-
MD5
119c59f04d78ae250d3ab71dab98b908
-
SHA1
161ca3975f3f68c7d5743a465971412087e0df10
-
SHA256
0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd
-
SHA512
1b65434c42412e92d90392919ffb915d5f8c9d1f3093a6814d3c85160d61f9f691014fb799be944270557946df9ed410aeda00fac6a844aca8001eac8139037d
-
SSDEEP
6144:K+y+bnr+wp0yN90QE85F5OYc1u31g4TByX4a1flW4aMPEsxS:aMrwy902xc1u31TTEX4YflpPHxS
Static task
static1
Behavioral task
behavioral1
Sample
0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Targets
-
-
Target
0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd.exe
-
Size
307KB
-
MD5
119c59f04d78ae250d3ab71dab98b908
-
SHA1
161ca3975f3f68c7d5743a465971412087e0df10
-
SHA256
0ff59be82fb8e881daba0110e9ce68423726dc64e6d4d9a28164a8205d7ce0cd
-
SHA512
1b65434c42412e92d90392919ffb915d5f8c9d1f3093a6814d3c85160d61f9f691014fb799be944270557946df9ed410aeda00fac6a844aca8001eac8139037d
-
SSDEEP
6144:K+y+bnr+wp0yN90QE85F5OYc1u31g4TByX4a1flW4aMPEsxS:aMrwy902xc1u31TTEX4YflpPHxS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1