General
-
Target
8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b
-
Size
533KB
-
Sample
241105-1j8gjsygle
-
MD5
f6cef7753517093597288a2c0b6ce9ab
-
SHA1
cd564536c6ca8dd932e40f12c1f03774b140b4af
-
SHA256
8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b
-
SHA512
bcece2db56ea9665fb4f2989b1099c077090c9cea4870cbafd68bf9214f0728b20297ca857dc5353fa36201de210485a0a87148bef9f4c3e2ecee4dfbc33c922
-
SSDEEP
12288:mMrmy90WpEdMIDfwUdpYUpkUtKhnxaUO0zBLfLv8nKaX7R:Ey7hVwKhnxaI1bLYxLR
Static task
static1
Behavioral task
behavioral1
Sample
8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b
-
Size
533KB
-
MD5
f6cef7753517093597288a2c0b6ce9ab
-
SHA1
cd564536c6ca8dd932e40f12c1f03774b140b4af
-
SHA256
8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b
-
SHA512
bcece2db56ea9665fb4f2989b1099c077090c9cea4870cbafd68bf9214f0728b20297ca857dc5353fa36201de210485a0a87148bef9f4c3e2ecee4dfbc33c922
-
SSDEEP
12288:mMrmy90WpEdMIDfwUdpYUpkUtKhnxaUO0zBLfLv8nKaX7R:Ey7hVwKhnxaI1bLYxLR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1