General
-
Target
10c353c118a54833021f91a6d4d74119a3cedf6c8433351bb341f35ee54dbe9d
-
Size
522KB
-
Sample
241111-ccxvgazgpc
-
MD5
bf053b2003ec6da2a7f47412d988bf07
-
SHA1
9e4e9aedc610708a8f1e6494a6457a2d0db30f70
-
SHA256
10c353c118a54833021f91a6d4d74119a3cedf6c8433351bb341f35ee54dbe9d
-
SHA512
68a22983ce4234ab42275d68aab34bcff415caf03f864dfdc3206ce67f03c099f7c56d8d1a52623e6c938c3ecaf83fc0d01913a5112e4f8d801677a776b419e7
-
SSDEEP
6144:KHy+bnr+pp0yN90QEcGrWcXepE6pZSPVDZi8rnT21UfSs8twA5wlBYZgvpkt0QtB:xMr5y90OGaczNhpe3Cutmkz6aIYCVE
Static task
static1
Behavioral task
behavioral1
Sample
10c353c118a54833021f91a6d4d74119a3cedf6c8433351bb341f35ee54dbe9d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
10c353c118a54833021f91a6d4d74119a3cedf6c8433351bb341f35ee54dbe9d
-
Size
522KB
-
MD5
bf053b2003ec6da2a7f47412d988bf07
-
SHA1
9e4e9aedc610708a8f1e6494a6457a2d0db30f70
-
SHA256
10c353c118a54833021f91a6d4d74119a3cedf6c8433351bb341f35ee54dbe9d
-
SHA512
68a22983ce4234ab42275d68aab34bcff415caf03f864dfdc3206ce67f03c099f7c56d8d1a52623e6c938c3ecaf83fc0d01913a5112e4f8d801677a776b419e7
-
SSDEEP
6144:KHy+bnr+pp0yN90QEcGrWcXepE6pZSPVDZi8rnT21UfSs8twA5wlBYZgvpkt0QtB:xMr5y90OGaczNhpe3Cutmkz6aIYCVE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1