General
-
Target
507e20a361c5a775a5b083145d08cf974aeb90ab7a7150ccfe84d837d2130de1
-
Size
534KB
-
Sample
241104-qywq7a1cnk
-
MD5
b5e1fdd201eb3309bf21fbce68bd2f10
-
SHA1
a9dc00c8fcd276583eb4f6b73deb05adc048ce03
-
SHA256
507e20a361c5a775a5b083145d08cf974aeb90ab7a7150ccfe84d837d2130de1
-
SHA512
91cba63b40a1b2d00f3a0e6456464c96ebd894e10dfd43fb1fc490e155a1e1f40c3fe418a21df976a9093cc864f37dc9eb4a97ab310c0f86cae2a24af3f7b4ec
-
SSDEEP
12288:sMrCy90Mx4Xet2CE/hr2O4y8C1zAbKWfZm21VZ3c:2ywJ/n8C1zoKCZVVNc
Static task
static1
Behavioral task
behavioral1
Sample
507e20a361c5a775a5b083145d08cf974aeb90ab7a7150ccfe84d837d2130de1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
507e20a361c5a775a5b083145d08cf974aeb90ab7a7150ccfe84d837d2130de1
-
Size
534KB
-
MD5
b5e1fdd201eb3309bf21fbce68bd2f10
-
SHA1
a9dc00c8fcd276583eb4f6b73deb05adc048ce03
-
SHA256
507e20a361c5a775a5b083145d08cf974aeb90ab7a7150ccfe84d837d2130de1
-
SHA512
91cba63b40a1b2d00f3a0e6456464c96ebd894e10dfd43fb1fc490e155a1e1f40c3fe418a21df976a9093cc864f37dc9eb4a97ab310c0f86cae2a24af3f7b4ec
-
SSDEEP
12288:sMrCy90Mx4Xet2CE/hr2O4y8C1zAbKWfZm21VZ3c:2ywJ/n8C1zoKCZVVNc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1