General
-
Target
5522e44eeb10fa90d2963a1c030daedcd1127efeb4a99f69b2ce4da9bcf3ad99
-
Size
524KB
-
Sample
241105-1fhfyszdjj
-
MD5
f2bdaf0c8a544133242fe0d7d1e239cd
-
SHA1
774eda4d540e268ccdc3a541f25f16fdd458e2a8
-
SHA256
5522e44eeb10fa90d2963a1c030daedcd1127efeb4a99f69b2ce4da9bcf3ad99
-
SHA512
addac32bdf2e784f1ab6bc244cb48462da90a01d4391b26d062ce1ed71a238eb92f07532d8778acdd0f3ae9205bbf9a6bce591b7dcddc6f0fe7a1c7bf861a235
-
SSDEEP
12288:0MrHy90wWNZUpvlmh+O67L6qu6mWRQLJgJs:DywN2pvlkd6X6qu6no+G
Static task
static1
Behavioral task
behavioral1
Sample
5522e44eeb10fa90d2963a1c030daedcd1127efeb4a99f69b2ce4da9bcf3ad99.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5522e44eeb10fa90d2963a1c030daedcd1127efeb4a99f69b2ce4da9bcf3ad99
-
Size
524KB
-
MD5
f2bdaf0c8a544133242fe0d7d1e239cd
-
SHA1
774eda4d540e268ccdc3a541f25f16fdd458e2a8
-
SHA256
5522e44eeb10fa90d2963a1c030daedcd1127efeb4a99f69b2ce4da9bcf3ad99
-
SHA512
addac32bdf2e784f1ab6bc244cb48462da90a01d4391b26d062ce1ed71a238eb92f07532d8778acdd0f3ae9205bbf9a6bce591b7dcddc6f0fe7a1c7bf861a235
-
SSDEEP
12288:0MrHy90wWNZUpvlmh+O67L6qu6mWRQLJgJs:DywN2pvlkd6X6qu6no+G
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1