General
-
Target
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef
-
Size
670KB
-
Sample
241110-3tc5haxhqb
-
MD5
f37f9aec58ff6af9d419e6dd428ece8f
-
SHA1
81bf96262736eaa68205bb576ee07694dc0610ac
-
SHA256
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef
-
SHA512
1b9d6fb095b43a72dc948c44c3a06c4a9a26e1c927963c9f2ca7d2a2459aafd23930bd4f07a7603a03545e9b1910a4c6f256f83fba1d07ab3d34945919d7e395
-
SSDEEP
12288:aMr6y90Xz5Y9AavBRh+8vPGClolQ07upwoZFiTLt59srw4bXCzapft/ju5jkmVu:cy2z+9Aav7hVXIRQLiTLt52nbyzGB0u
Static task
static1
Behavioral task
behavioral1
Sample
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef
-
Size
670KB
-
MD5
f37f9aec58ff6af9d419e6dd428ece8f
-
SHA1
81bf96262736eaa68205bb576ee07694dc0610ac
-
SHA256
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef
-
SHA512
1b9d6fb095b43a72dc948c44c3a06c4a9a26e1c927963c9f2ca7d2a2459aafd23930bd4f07a7603a03545e9b1910a4c6f256f83fba1d07ab3d34945919d7e395
-
SSDEEP
12288:aMr6y90Xz5Y9AavBRh+8vPGClolQ07upwoZFiTLt59srw4bXCzapft/ju5jkmVu:cy2z+9Aav7hVXIRQLiTLt52nbyzGB0u
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1