General
-
Target
5c00b1fd652a3b1f643c788b2503548e33859b8c5ee6fa58b6c509e1ac79f3d6
-
Size
695KB
-
Sample
241105-2nxraazfja
-
MD5
50892fe5e350c65ea4e4293ec94dc118
-
SHA1
3844c279f641a89bd654faaea8926b3089824dcb
-
SHA256
5c00b1fd652a3b1f643c788b2503548e33859b8c5ee6fa58b6c509e1ac79f3d6
-
SHA512
62cf556da698267124a0d5c1b8e32cdd00a3f60e2c0cd0edf127177a0851c416ed88d534843d66c3c0ff5b9afd1ba281f699821584d2c8009e45c2583b591179
-
SSDEEP
12288:bMr8y90GDiSkWjLURGx7BhYihKU4PYI1pZ2YCSEv/a5VmjF78/v:PyB1kkZB2q4k9/cVmsv
Static task
static1
Behavioral task
behavioral1
Sample
5c00b1fd652a3b1f643c788b2503548e33859b8c5ee6fa58b6c509e1ac79f3d6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5c00b1fd652a3b1f643c788b2503548e33859b8c5ee6fa58b6c509e1ac79f3d6
-
Size
695KB
-
MD5
50892fe5e350c65ea4e4293ec94dc118
-
SHA1
3844c279f641a89bd654faaea8926b3089824dcb
-
SHA256
5c00b1fd652a3b1f643c788b2503548e33859b8c5ee6fa58b6c509e1ac79f3d6
-
SHA512
62cf556da698267124a0d5c1b8e32cdd00a3f60e2c0cd0edf127177a0851c416ed88d534843d66c3c0ff5b9afd1ba281f699821584d2c8009e45c2583b591179
-
SSDEEP
12288:bMr8y90GDiSkWjLURGx7BhYihKU4PYI1pZ2YCSEv/a5VmjF78/v:PyB1kkZB2q4k9/cVmsv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1