General
-
Target
256d719e2d2cebd5b359a29a7f07a15e79699f4457c545b5d8f0b625f973e98d
-
Size
537KB
-
Sample
241110-3t17bsxhrc
-
MD5
61f02fb0b62abe0bfc9eebaf9e3f2fc6
-
SHA1
f8e496c7f863d967f83c18b8c761b98e00111df7
-
SHA256
256d719e2d2cebd5b359a29a7f07a15e79699f4457c545b5d8f0b625f973e98d
-
SHA512
c7b5d6dac8e2404ee05cdbccdd083f95912db69bc3704ddfeccc8c291eccbce0e0bc9559efd24f97d8f9a2b49ef6a1e29329a3edd232f3dc28700eaeb1f522dc
-
SSDEEP
12288:fMr4y90VT2qcwEPOAXgU0eAsprU6SHOw7mZJrF1ary4:nyu/cw4gor4uwiZVW
Static task
static1
Behavioral task
behavioral1
Sample
256d719e2d2cebd5b359a29a7f07a15e79699f4457c545b5d8f0b625f973e98d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
256d719e2d2cebd5b359a29a7f07a15e79699f4457c545b5d8f0b625f973e98d
-
Size
537KB
-
MD5
61f02fb0b62abe0bfc9eebaf9e3f2fc6
-
SHA1
f8e496c7f863d967f83c18b8c761b98e00111df7
-
SHA256
256d719e2d2cebd5b359a29a7f07a15e79699f4457c545b5d8f0b625f973e98d
-
SHA512
c7b5d6dac8e2404ee05cdbccdd083f95912db69bc3704ddfeccc8c291eccbce0e0bc9559efd24f97d8f9a2b49ef6a1e29329a3edd232f3dc28700eaeb1f522dc
-
SSDEEP
12288:fMr4y90VT2qcwEPOAXgU0eAsprU6SHOw7mZJrF1ary4:nyu/cw4gor4uwiZVW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1