General
-
Target
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834
-
Size
560KB
-
Sample
241104-rtg8nstnej
-
MD5
0e4a824c329ea3568cdfc4ba786c94d1
-
SHA1
ee6eeeb1db5551734d81acf5e4a50bafcb0942dc
-
SHA256
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834
-
SHA512
ab0cba06c310eb0771c81725db9824332e1c82e587f34dd33502f8c7c05641325e2b2bb28d73f9c45894d4fb3447702e1cabf23dd5f98f7dcbcfe7b22aee7e97
-
SSDEEP
12288:rMrGy902DsqalMUHagg0MPzlQ4/wn354Jsl5+:RyJwMsg0MPzlQuwWsa
Static task
static1
Behavioral task
behavioral1
Sample
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834
-
Size
560KB
-
MD5
0e4a824c329ea3568cdfc4ba786c94d1
-
SHA1
ee6eeeb1db5551734d81acf5e4a50bafcb0942dc
-
SHA256
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834
-
SHA512
ab0cba06c310eb0771c81725db9824332e1c82e587f34dd33502f8c7c05641325e2b2bb28d73f9c45894d4fb3447702e1cabf23dd5f98f7dcbcfe7b22aee7e97
-
SSDEEP
12288:rMrGy902DsqalMUHagg0MPzlQ4/wn354Jsl5+:RyJwMsg0MPzlQuwWsa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1