General
-
Target
92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491
-
Size
530KB
-
Sample
241030-1j52es1hpg
-
MD5
3fd6d5f18bf08b4b813b6cc8c533ba26
-
SHA1
219181babf1539a1700aefaab3d76dec6e8800a0
-
SHA256
92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491
-
SHA512
8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59
-
SSDEEP
12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E
Static task
static1
Behavioral task
behavioral1
Sample
92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491
-
Size
530KB
-
MD5
3fd6d5f18bf08b4b813b6cc8c533ba26
-
SHA1
219181babf1539a1700aefaab3d76dec6e8800a0
-
SHA256
92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491
-
SHA512
8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59
-
SSDEEP
12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1