General
-
Target
034aa6971a6ab8b55bb19f18a9aa8071f68c9a938d4d2c3c67cf1ea59a6d1879
-
Size
689KB
-
Sample
241105-2vjs1asrfj
-
MD5
5552a8a5f529879c4e48ffa0d193254b
-
SHA1
33d2cdf22ae7c878849ba793fa6c0085cc79f966
-
SHA256
034aa6971a6ab8b55bb19f18a9aa8071f68c9a938d4d2c3c67cf1ea59a6d1879
-
SHA512
0c5f6d7c585e925c4e1a530faaa98be21b280f793ce79908fcc66f818b5959bdb6dac5f9e0ec6503eb4c04343ef6ceebac495360acb7fecb556fbb7c60082e7a
-
SSDEEP
12288:6MrEy90HVyQRpkU2LK1qlVoVfOhl73q3bghVbcZeTq9Y/Fog1:6ywXRG/wqlVoVfOhZq38hVbkPYqO
Static task
static1
Behavioral task
behavioral1
Sample
034aa6971a6ab8b55bb19f18a9aa8071f68c9a938d4d2c3c67cf1ea59a6d1879.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
034aa6971a6ab8b55bb19f18a9aa8071f68c9a938d4d2c3c67cf1ea59a6d1879
-
Size
689KB
-
MD5
5552a8a5f529879c4e48ffa0d193254b
-
SHA1
33d2cdf22ae7c878849ba793fa6c0085cc79f966
-
SHA256
034aa6971a6ab8b55bb19f18a9aa8071f68c9a938d4d2c3c67cf1ea59a6d1879
-
SHA512
0c5f6d7c585e925c4e1a530faaa98be21b280f793ce79908fcc66f818b5959bdb6dac5f9e0ec6503eb4c04343ef6ceebac495360acb7fecb556fbb7c60082e7a
-
SSDEEP
12288:6MrEy90HVyQRpkU2LK1qlVoVfOhl73q3bghVbcZeTq9Y/Fog1:6ywXRG/wqlVoVfOhZq38hVbkPYqO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1