General
-
Target
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d
-
Size
559KB
-
Sample
241111-cgs23szhmg
-
MD5
ec5bd8c7ab57f2ea648392a8ccb88620
-
SHA1
c1f85dd1559e3e623a9ecc08c46135c9552bc744
-
SHA256
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d
-
SHA512
f9a1a989f2be8421a08d0bb59a47a0ab859d82929c446d2248c92fc86c6ce328f68ea68925d62a844640b1367636ccf16f8bca07464b276a832b52744a79f11b
-
SSDEEP
12288:IMrey90il5ydxTS7E3Q/XWmYaggHMn76+jGAOwXPQL:2yh1E3GXWmggHM7pjGAOxL
Static task
static1
Behavioral task
behavioral1
Sample
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d
-
Size
559KB
-
MD5
ec5bd8c7ab57f2ea648392a8ccb88620
-
SHA1
c1f85dd1559e3e623a9ecc08c46135c9552bc744
-
SHA256
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d
-
SHA512
f9a1a989f2be8421a08d0bb59a47a0ab859d82929c446d2248c92fc86c6ce328f68ea68925d62a844640b1367636ccf16f8bca07464b276a832b52744a79f11b
-
SSDEEP
12288:IMrey90il5ydxTS7E3Q/XWmYaggHMn76+jGAOwXPQL:2yh1E3GXWmggHM7pjGAOxL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1