General
-
Target
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925
-
Size
660KB
-
Sample
241111-cr3dhazkgv
-
MD5
1ba6a1b0915311c4e862f47ab7f2a71b
-
SHA1
bb00f8b88f45a95987a1c1353318dbcda77db1b8
-
SHA256
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925
-
SHA512
3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc
-
SSDEEP
12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ
Static task
static1
Behavioral task
behavioral1
Sample
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925
-
Size
660KB
-
MD5
1ba6a1b0915311c4e862f47ab7f2a71b
-
SHA1
bb00f8b88f45a95987a1c1353318dbcda77db1b8
-
SHA256
fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925
-
SHA512
3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc
-
SSDEEP
12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1