General
-
Target
11f9abf07a1b760c943d01c5149e060829d51d01ac56f48b19e9d10680d76c0b
-
Size
689KB
-
Sample
241105-1dyeds1qbp
-
MD5
9386d8f172e2e87b9cae61d2fdbb9134
-
SHA1
9af3c1456969da507c86bc02c48e6fbea762e484
-
SHA256
11f9abf07a1b760c943d01c5149e060829d51d01ac56f48b19e9d10680d76c0b
-
SHA512
da6c8d9657d889e72c712637cbf87f4f571dc943798c64cc91914fcd20b3f7f53894d85d234dbb6eace6ce81cb703a0fdec07cdf076309e75ab26fb72250bb54
-
SSDEEP
12288:SMrIy90C7PqEcirO4zVEou0K4luHPBMDIfIv0NeVXtK7fprOqdPgToc:myP7SUy4zVRu/4luHPSDnv0EVE7fpCv
Static task
static1
Behavioral task
behavioral1
Sample
11f9abf07a1b760c943d01c5149e060829d51d01ac56f48b19e9d10680d76c0b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
11f9abf07a1b760c943d01c5149e060829d51d01ac56f48b19e9d10680d76c0b
-
Size
689KB
-
MD5
9386d8f172e2e87b9cae61d2fdbb9134
-
SHA1
9af3c1456969da507c86bc02c48e6fbea762e484
-
SHA256
11f9abf07a1b760c943d01c5149e060829d51d01ac56f48b19e9d10680d76c0b
-
SHA512
da6c8d9657d889e72c712637cbf87f4f571dc943798c64cc91914fcd20b3f7f53894d85d234dbb6eace6ce81cb703a0fdec07cdf076309e75ab26fb72250bb54
-
SSDEEP
12288:SMrIy90C7PqEcirO4zVEou0K4luHPBMDIfIv0NeVXtK7fprOqdPgToc:myP7SUy4zVRu/4luHPSDnv0EVE7fpCv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1