General
-
Target
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559
-
Size
537KB
-
Sample
241111-bgc57aykfy
-
MD5
d50b34d1e23ba5898eb25ea760ac068e
-
SHA1
1feb59ea9916f26e44786d44a210d4a3efe5db02
-
SHA256
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559
-
SHA512
39de364f05e28922751bf5ba794cb4f2cadd32b4295e187f0303fa87c23743d1eb5c5d61851f20f9a24d1b37f24625c352edf2a451dc3488ebeb4863c1a34742
-
SSDEEP
12288:aMrSy90Kue6DMGI0CCOrU92H2w/0x9Dhk:sy96CCOrLWw/oDe
Static task
static1
Behavioral task
behavioral1
Sample
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559
-
Size
537KB
-
MD5
d50b34d1e23ba5898eb25ea760ac068e
-
SHA1
1feb59ea9916f26e44786d44a210d4a3efe5db02
-
SHA256
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559
-
SHA512
39de364f05e28922751bf5ba794cb4f2cadd32b4295e187f0303fa87c23743d1eb5c5d61851f20f9a24d1b37f24625c352edf2a451dc3488ebeb4863c1a34742
-
SSDEEP
12288:aMrSy90Kue6DMGI0CCOrU92H2w/0x9Dhk:sy96CCOrLWw/oDe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1