General
-
Target
5de0ba05600ac2fddb4fb1e242447a5f382649c731366905ac14539bdbaf1870
-
Size
485KB
-
Sample
241111-ck7dwa1akh
-
MD5
b4e930f8699a5b58a64ddc1fbb752069
-
SHA1
3df4f556200df0025d019725762ee72af09570c7
-
SHA256
5de0ba05600ac2fddb4fb1e242447a5f382649c731366905ac14539bdbaf1870
-
SHA512
5dfd44dd58fb2c171eb44e001026af43f3621d5493324192bbdad179b38edab0cc57deb62515a2dd90af2f0e871c8122245e85d6ce79e271b12b42b4b1821fff
-
SSDEEP
12288:IW9/l39Di23Qo+N1Z8m61u8m0QGSUDAp+JIuCP3:Ii/x9Di4dom1g0QG9y3
Static task
static1
Behavioral task
behavioral1
Sample
18610f0c5f8676474a4b2d84610ef53f043f12076ee2f7d35f4634987bf2943c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
18610f0c5f8676474a4b2d84610ef53f043f12076ee2f7d35f4634987bf2943c.exe
-
Size
536KB
-
MD5
8152de5fa13af0eb869f91fdf88f3486
-
SHA1
59bd30de444e154b71d3d7bf1f14a9e37d7ab153
-
SHA256
18610f0c5f8676474a4b2d84610ef53f043f12076ee2f7d35f4634987bf2943c
-
SHA512
e9e03d84edfa7fe33eae1faa3c321d1d364e8d52ea1441222091238c31e36f25a51cb8477dbafd6578ab15905cf2b095d0b13d64e3d71957d11668a335218860
-
SSDEEP
12288:HMr7y90Xm9sHJVOoxyCPEfYiIG7Z89J7tg5pyF40N8:YyNaVOVCygupyel
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1