General
-
Target
46a4411ee2fd366d4e5926a4af9d0374d030bbdf908ababe8da21f3433c8572a
-
Size
666KB
-
Sample
241104-qdmyjsyrgt
-
MD5
fe2a3e0ad6921cd3350b0a386faae2ed
-
SHA1
2935faefa9ccde9fcba051eba5840958719ea331
-
SHA256
46a4411ee2fd366d4e5926a4af9d0374d030bbdf908ababe8da21f3433c8572a
-
SHA512
7705243eeb26108b4e9aa7c6c06184db7968faff9a5c9eb1be1c7443816d4b19b3090065f55e2b947e373507e0a13ac0070017d86ff7fb9e83ce59a7293af993
-
SSDEEP
12288:yMroy90RP938AEruVAZ+52VHZ6GNTgr8ZMPVurUJvu/wwB0P:+yoPu9gAZLHZVNTgr8ZcVurQ4wwBG
Static task
static1
Behavioral task
behavioral1
Sample
46a4411ee2fd366d4e5926a4af9d0374d030bbdf908ababe8da21f3433c8572a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
46a4411ee2fd366d4e5926a4af9d0374d030bbdf908ababe8da21f3433c8572a
-
Size
666KB
-
MD5
fe2a3e0ad6921cd3350b0a386faae2ed
-
SHA1
2935faefa9ccde9fcba051eba5840958719ea331
-
SHA256
46a4411ee2fd366d4e5926a4af9d0374d030bbdf908ababe8da21f3433c8572a
-
SHA512
7705243eeb26108b4e9aa7c6c06184db7968faff9a5c9eb1be1c7443816d4b19b3090065f55e2b947e373507e0a13ac0070017d86ff7fb9e83ce59a7293af993
-
SSDEEP
12288:yMroy90RP938AEruVAZ+52VHZ6GNTgr8ZMPVurUJvu/wwB0P:+yoPu9gAZLHZVNTgr8ZcVurQ4wwBG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1