General
-
Target
da5b186e215413612cada8bb19f2f0db568c880e3b1c9a557c954d624ae0dd84
-
Size
659KB
-
Sample
241111-c8zc6s1erc
-
MD5
c656e1d517c3285d29c2d90b7ab8ae2d
-
SHA1
7eff86bbf993c624e1f08fe2f6929edb7c624a9a
-
SHA256
da5b186e215413612cada8bb19f2f0db568c880e3b1c9a557c954d624ae0dd84
-
SHA512
c75c3aabc2cb481fd5fc463421c89a216114afc9fb9a2658732ec2567ceffc2ac028b6381016cbcf6215738e5da242bd6473d011531a50c714633648b7ef4e8a
-
SSDEEP
12288:yMrSy90vS2n/aFEW5cFWjm9Rs5P2IrVi1Mof5KMa/1mmpObb7v1fgt:cyUtFWj8R+pVi11AnmmpC71fM
Static task
static1
Behavioral task
behavioral1
Sample
da5b186e215413612cada8bb19f2f0db568c880e3b1c9a557c954d624ae0dd84.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
da5b186e215413612cada8bb19f2f0db568c880e3b1c9a557c954d624ae0dd84
-
Size
659KB
-
MD5
c656e1d517c3285d29c2d90b7ab8ae2d
-
SHA1
7eff86bbf993c624e1f08fe2f6929edb7c624a9a
-
SHA256
da5b186e215413612cada8bb19f2f0db568c880e3b1c9a557c954d624ae0dd84
-
SHA512
c75c3aabc2cb481fd5fc463421c89a216114afc9fb9a2658732ec2567ceffc2ac028b6381016cbcf6215738e5da242bd6473d011531a50c714633648b7ef4e8a
-
SSDEEP
12288:yMrSy90vS2n/aFEW5cFWjm9Rs5P2IrVi1Mof5KMa/1mmpObb7v1fgt:cyUtFWj8R+pVi11AnmmpC71fM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1