General
-
Target
9677ba890800cdbdc1e903516d69ec09c3d6cdaf2380fe65871b3d83404e8cd7
-
Size
530KB
-
Sample
241110-3wa3xs1kfn
-
MD5
698b616c71808ba6c066df7a383bf74a
-
SHA1
5a09d95299a804399523ed001cef8ae14159ed65
-
SHA256
9677ba890800cdbdc1e903516d69ec09c3d6cdaf2380fe65871b3d83404e8cd7
-
SHA512
266e547ba40aa404b70bf7bccd9979e00e7fe4c831905e395b6b269a5b33e78caa1162f466f94b500276d950e118c894310294c062a8914adffce442a865ca9c
-
SSDEEP
12288:BMr8y90rjes006cjKi2jKuBgoE8lxLbHaYYy:5yOj7icjKizoE8PLOYYy
Static task
static1
Behavioral task
behavioral1
Sample
9677ba890800cdbdc1e903516d69ec09c3d6cdaf2380fe65871b3d83404e8cd7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
9677ba890800cdbdc1e903516d69ec09c3d6cdaf2380fe65871b3d83404e8cd7
-
Size
530KB
-
MD5
698b616c71808ba6c066df7a383bf74a
-
SHA1
5a09d95299a804399523ed001cef8ae14159ed65
-
SHA256
9677ba890800cdbdc1e903516d69ec09c3d6cdaf2380fe65871b3d83404e8cd7
-
SHA512
266e547ba40aa404b70bf7bccd9979e00e7fe4c831905e395b6b269a5b33e78caa1162f466f94b500276d950e118c894310294c062a8914adffce442a865ca9c
-
SSDEEP
12288:BMr8y90rjes006cjKi2jKuBgoE8lxLbHaYYy:5yOj7icjKizoE8PLOYYy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1