General
-
Target
3d14aed5ae97a1936daa392969f4ef1092c0e61e71ac65c9b1a8c292da4832dd
-
Size
689KB
-
Sample
241105-1fa2waykfs
-
MD5
565989d9643831e5d78d7a84d9b6a73a
-
SHA1
e7ba1942d15a65a9700c21896b1f81fb2f1fa46a
-
SHA256
3d14aed5ae97a1936daa392969f4ef1092c0e61e71ac65c9b1a8c292da4832dd
-
SHA512
45bfe3efc55097d732413594b7d72ac44db549930f5b330d9bd7b25383004b7aac1c7ec570645a9a9fcdf172812e20ca999b7c001cc052c3803a6bea6320b174
-
SSDEEP
12288:KMrYy907BjiAJtszxhIywIITdu3tkt/bJpMlGWCE8EdxJHbtKhChHEOX:Oywtio8xOyhIt/QFj8Edjb0dw
Static task
static1
Behavioral task
behavioral1
Sample
3d14aed5ae97a1936daa392969f4ef1092c0e61e71ac65c9b1a8c292da4832dd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3d14aed5ae97a1936daa392969f4ef1092c0e61e71ac65c9b1a8c292da4832dd
-
Size
689KB
-
MD5
565989d9643831e5d78d7a84d9b6a73a
-
SHA1
e7ba1942d15a65a9700c21896b1f81fb2f1fa46a
-
SHA256
3d14aed5ae97a1936daa392969f4ef1092c0e61e71ac65c9b1a8c292da4832dd
-
SHA512
45bfe3efc55097d732413594b7d72ac44db549930f5b330d9bd7b25383004b7aac1c7ec570645a9a9fcdf172812e20ca999b7c001cc052c3803a6bea6320b174
-
SSDEEP
12288:KMrYy907BjiAJtszxhIywIITdu3tkt/bJpMlGWCE8EdxJHbtKhChHEOX:Oywtio8xOyhIt/QFj8Edjb0dw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1