General
-
Target
5eb47e4ba02d39756a52ace324caf85b2b6b6f22d55b7470bb5fb1b6a0af568b
-
Size
522KB
-
Sample
241111-glrr2atkgt
-
MD5
720bd5c70e841b0bf6ec32f99da0ff9f
-
SHA1
fc51f65055248c294f23a089659864eaf120694a
-
SHA256
5eb47e4ba02d39756a52ace324caf85b2b6b6f22d55b7470bb5fb1b6a0af568b
-
SHA512
693340a0f3a8c99c8bf3ca08cf602b719fd46b717b99bee72f2b19f2e8981b4b3d4496c962b047c30584317447b6f1db2b8e4fde39d25cb383dec1ed75cb7e3c
-
SSDEEP
12288:5MrRy907tjVnfMVb50e+lV9+mv6q2dmZPEQjD4I0dY:4yPTkp6q2dwL390dY
Static task
static1
Behavioral task
behavioral1
Sample
5eb47e4ba02d39756a52ace324caf85b2b6b6f22d55b7470bb5fb1b6a0af568b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5eb47e4ba02d39756a52ace324caf85b2b6b6f22d55b7470bb5fb1b6a0af568b
-
Size
522KB
-
MD5
720bd5c70e841b0bf6ec32f99da0ff9f
-
SHA1
fc51f65055248c294f23a089659864eaf120694a
-
SHA256
5eb47e4ba02d39756a52ace324caf85b2b6b6f22d55b7470bb5fb1b6a0af568b
-
SHA512
693340a0f3a8c99c8bf3ca08cf602b719fd46b717b99bee72f2b19f2e8981b4b3d4496c962b047c30584317447b6f1db2b8e4fde39d25cb383dec1ed75cb7e3c
-
SSDEEP
12288:5MrRy907tjVnfMVb50e+lV9+mv6q2dmZPEQjD4I0dY:4yPTkp6q2dwL390dY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1