General
-
Target
789493d4af5115ebf53950c83cc0e41bf97f25f3456217abcd7090cb9b0e0127
-
Size
530KB
-
Sample
241104-qltq3a1aql
-
MD5
b3a790e0984060f0fef02e8aa8a29647
-
SHA1
10300524a688ead9786b43800a3389063038b972
-
SHA256
789493d4af5115ebf53950c83cc0e41bf97f25f3456217abcd7090cb9b0e0127
-
SHA512
54c8433edfcab8beebd792f27e9f2819b9775d7005dc08ddca12827ff4ff570cd97dfdc06552c8aa905ed0d3980646e71b193795b37c32916a9cf874dd6e0a76
-
SSDEEP
12288:1MrUy90cHtIcHnqISCWKeXL6KvLQuqBV8tg+rJW+kPaSj:1ylN+IsKOjDQ97ca7
Static task
static1
Behavioral task
behavioral1
Sample
789493d4af5115ebf53950c83cc0e41bf97f25f3456217abcd7090cb9b0e0127.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
789493d4af5115ebf53950c83cc0e41bf97f25f3456217abcd7090cb9b0e0127
-
Size
530KB
-
MD5
b3a790e0984060f0fef02e8aa8a29647
-
SHA1
10300524a688ead9786b43800a3389063038b972
-
SHA256
789493d4af5115ebf53950c83cc0e41bf97f25f3456217abcd7090cb9b0e0127
-
SHA512
54c8433edfcab8beebd792f27e9f2819b9775d7005dc08ddca12827ff4ff570cd97dfdc06552c8aa905ed0d3980646e71b193795b37c32916a9cf874dd6e0a76
-
SSDEEP
12288:1MrUy90cHtIcHnqISCWKeXL6KvLQuqBV8tg+rJW+kPaSj:1ylN+IsKOjDQ97ca7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1