General
-
Target
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b
-
Size
660KB
-
Sample
241110-3q2zfsxhlb
-
MD5
621144a709582592e198bfb060fd7261
-
SHA1
0aee31ed1439b7eeb39e3ad76d80e2532162711f
-
SHA256
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b
-
SHA512
c9cc9b3bb9aadcaca3867e325a91820e9220cf65018dd88b2304eca3c687fe056e19c5d4e0f6a44dbdc9848e2402a66ecfb79e49b06fb21b4aafcfc55f041545
-
SSDEEP
12288:VMrAy90siQhiy07uoJ4n2GypzE5VfaaycsOFBlRzEiA2/z:9yq1SaEFFsOFGiNr
Static task
static1
Behavioral task
behavioral1
Sample
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b
-
Size
660KB
-
MD5
621144a709582592e198bfb060fd7261
-
SHA1
0aee31ed1439b7eeb39e3ad76d80e2532162711f
-
SHA256
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b
-
SHA512
c9cc9b3bb9aadcaca3867e325a91820e9220cf65018dd88b2304eca3c687fe056e19c5d4e0f6a44dbdc9848e2402a66ecfb79e49b06fb21b4aafcfc55f041545
-
SSDEEP
12288:VMrAy90siQhiy07uoJ4n2GypzE5VfaaycsOFBlRzEiA2/z:9yq1SaEFFsOFGiNr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1