General
-
Target
f963b3faac0710e672d6b0393961b4d352694c065d166d2e7c3e0752f88c1582N.exe
-
Size
516KB
-
Sample
241118-wvss1ssjfw
-
MD5
8c3f6e0eee437915256b8021ef58e180
-
SHA1
cbe56b66bb7c48c30f1db9fbc057d8d0db7fa96b
-
SHA256
f963b3faac0710e672d6b0393961b4d352694c065d166d2e7c3e0752f88c1582
-
SHA512
3aa8eab189121916f53bad66b6f61cfe408f7bdd1e46d72fa5334ea44389eceefb2c45e9e387b45b90e332600bc0e4141ddfab36a64e3dcab15ac53faa10e089
-
SSDEEP
12288:2MrRy90t1Gs244YxUZnz8HuvUOwzxI2X4IxMVmc:HyRs244YxUZgHuvVwzxrIUWmc
Static task
static1
Behavioral task
behavioral1
Sample
f963b3faac0710e672d6b0393961b4d352694c065d166d2e7c3e0752f88c1582N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f963b3faac0710e672d6b0393961b4d352694c065d166d2e7c3e0752f88c1582N.exe
-
Size
516KB
-
MD5
8c3f6e0eee437915256b8021ef58e180
-
SHA1
cbe56b66bb7c48c30f1db9fbc057d8d0db7fa96b
-
SHA256
f963b3faac0710e672d6b0393961b4d352694c065d166d2e7c3e0752f88c1582
-
SHA512
3aa8eab189121916f53bad66b6f61cfe408f7bdd1e46d72fa5334ea44389eceefb2c45e9e387b45b90e332600bc0e4141ddfab36a64e3dcab15ac53faa10e089
-
SSDEEP
12288:2MrRy90t1Gs244YxUZnz8HuvUOwzxI2X4IxMVmc:HyRs244YxUZgHuvVwzxrIUWmc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1