General
-
Target
50df71774ab7540a9349f9a4340dbe8df484962fa47064bf3e515891c9836472
-
Size
522KB
-
Sample
241105-3dkveaznhw
-
MD5
27bbfbeeff222a8d5e0db44ababc8abf
-
SHA1
366b0751e740af17506114c35eb4b2e506d05b78
-
SHA256
50df71774ab7540a9349f9a4340dbe8df484962fa47064bf3e515891c9836472
-
SHA512
28336dfc0c7b0bddd64c18e328d97351583f560db53da1765d397276ffa837d07add2d1acf5c8ef346011704898426599b1f423a1ab72d87a8351bba84491d94
-
SSDEEP
12288:IMrXy90ZefnNzOrgGIXHo6qEqmHqICoGQX3I:/yyw0MZHo6qEqcqI/4
Static task
static1
Behavioral task
behavioral1
Sample
50df71774ab7540a9349f9a4340dbe8df484962fa47064bf3e515891c9836472.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
50df71774ab7540a9349f9a4340dbe8df484962fa47064bf3e515891c9836472
-
Size
522KB
-
MD5
27bbfbeeff222a8d5e0db44ababc8abf
-
SHA1
366b0751e740af17506114c35eb4b2e506d05b78
-
SHA256
50df71774ab7540a9349f9a4340dbe8df484962fa47064bf3e515891c9836472
-
SHA512
28336dfc0c7b0bddd64c18e328d97351583f560db53da1765d397276ffa837d07add2d1acf5c8ef346011704898426599b1f423a1ab72d87a8351bba84491d94
-
SSDEEP
12288:IMrXy90ZefnNzOrgGIXHo6qEqmHqICoGQX3I:/yyw0MZHo6qEqcqI/4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1