General
-
Target
256c15a088c7ce4f51ee7227efd60d78d411afb518d97ced9b21ee71bdb8c7c4
-
Size
696KB
-
Sample
241110-3yt9ks1lbn
-
MD5
76c8b5ff24f8c9477f8696118c0a8a25
-
SHA1
56f850594592f6ecf9dd93f344c3ff5be91193d2
-
SHA256
256c15a088c7ce4f51ee7227efd60d78d411afb518d97ced9b21ee71bdb8c7c4
-
SHA512
24418547efa642ffe03b192521da7e653d0a9e439c72bd887e2258349183946ffd32d1efaa5197d3bb995e32c67777ee3620a93720cec0f1f120522c23226f38
-
SSDEEP
12288:9Mrhy90HHpLMNb0Bh40JH8CXIaDzHLkUc4O4twMCzYpVvA9ZYIHr4AtSC:YyUKNb8hdcqIOjhBwMNS9SI3d
Static task
static1
Behavioral task
behavioral1
Sample
256c15a088c7ce4f51ee7227efd60d78d411afb518d97ced9b21ee71bdb8c7c4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
256c15a088c7ce4f51ee7227efd60d78d411afb518d97ced9b21ee71bdb8c7c4
-
Size
696KB
-
MD5
76c8b5ff24f8c9477f8696118c0a8a25
-
SHA1
56f850594592f6ecf9dd93f344c3ff5be91193d2
-
SHA256
256c15a088c7ce4f51ee7227efd60d78d411afb518d97ced9b21ee71bdb8c7c4
-
SHA512
24418547efa642ffe03b192521da7e653d0a9e439c72bd887e2258349183946ffd32d1efaa5197d3bb995e32c67777ee3620a93720cec0f1f120522c23226f38
-
SSDEEP
12288:9Mrhy90HHpLMNb0Bh40JH8CXIaDzHLkUc4O4twMCzYpVvA9ZYIHr4AtSC:YyUKNb8hdcqIOjhBwMNS9SI3d
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1