General
-
Target
7513cb7cfb66e5358669e34fa9d52e4bed31e65993817db49ba590dd6e69df08
-
Size
538KB
-
Sample
241105-26dfcs1apa
-
MD5
11ed9fa96e55bb0555c4d4fbcb182d80
-
SHA1
f109af444985949a30c5879a672e5dfc9b8641ef
-
SHA256
7513cb7cfb66e5358669e34fa9d52e4bed31e65993817db49ba590dd6e69df08
-
SHA512
fba5a967c09dde3230a39101b6d2b95ba1efc7f12e74e084ed6a46882334ea78b044e623c09b877bf6c5f9f743e1ecfd71a830730bc8af6b342822715b3ba61f
-
SSDEEP
12288:KMr8y90z7z45J+1YyrUOSVD+0pL4hHTMIRnEDZOs19Y:iyRck8TtREDB6
Static task
static1
Behavioral task
behavioral1
Sample
7513cb7cfb66e5358669e34fa9d52e4bed31e65993817db49ba590dd6e69df08.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7513cb7cfb66e5358669e34fa9d52e4bed31e65993817db49ba590dd6e69df08
-
Size
538KB
-
MD5
11ed9fa96e55bb0555c4d4fbcb182d80
-
SHA1
f109af444985949a30c5879a672e5dfc9b8641ef
-
SHA256
7513cb7cfb66e5358669e34fa9d52e4bed31e65993817db49ba590dd6e69df08
-
SHA512
fba5a967c09dde3230a39101b6d2b95ba1efc7f12e74e084ed6a46882334ea78b044e623c09b877bf6c5f9f743e1ecfd71a830730bc8af6b342822715b3ba61f
-
SSDEEP
12288:KMr8y90z7z45J+1YyrUOSVD+0pL4hHTMIRnEDZOs19Y:iyRck8TtREDB6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1