General
-
Target
3ce7dca15f024ae7aa3e0083f90ff8e6b4f7866d43808cf1f82f34678ceb9391
-
Size
659KB
-
Sample
241110-3nbdqa1jbj
-
MD5
05ab91e47a359a25612334a3d5656336
-
SHA1
0bec08c1bf79b7a8c4d06f009edf6f96c9c2591a
-
SHA256
3ce7dca15f024ae7aa3e0083f90ff8e6b4f7866d43808cf1f82f34678ceb9391
-
SHA512
fb0f7f7caf8dcd2f8e68b3d9d4877370aa967f035ed8bd967d76d66a495e3a2b22697c4ff7120a9fa7983061fbb7a1bc2d58716c7e8c4d0c2d1ede031b4d3f8b
-
SSDEEP
12288:PMrhy90M11nQ8avZFiD8Dkywj/Vl5KFakY+ouYd1uDh8gEUS0s:+yf1H3Dtj7kY+olgEU9s
Static task
static1
Behavioral task
behavioral1
Sample
3ce7dca15f024ae7aa3e0083f90ff8e6b4f7866d43808cf1f82f34678ceb9391.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3ce7dca15f024ae7aa3e0083f90ff8e6b4f7866d43808cf1f82f34678ceb9391
-
Size
659KB
-
MD5
05ab91e47a359a25612334a3d5656336
-
SHA1
0bec08c1bf79b7a8c4d06f009edf6f96c9c2591a
-
SHA256
3ce7dca15f024ae7aa3e0083f90ff8e6b4f7866d43808cf1f82f34678ceb9391
-
SHA512
fb0f7f7caf8dcd2f8e68b3d9d4877370aa967f035ed8bd967d76d66a495e3a2b22697c4ff7120a9fa7983061fbb7a1bc2d58716c7e8c4d0c2d1ede031b4d3f8b
-
SSDEEP
12288:PMrhy90M11nQ8avZFiD8Dkywj/Vl5KFakY+ouYd1uDh8gEUS0s:+yf1H3Dtj7kY+olgEU9s
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1