General
-
Target
55a19528717a6c4c7b21caf61989aba8338ed7b12bacd69b5bc97526bfc9c077
-
Size
530KB
-
Sample
241105-3fb1aazpcx
-
MD5
30843c7d717e1963ac1011dd3a24688c
-
SHA1
8e372226bb0c5bcf09966e0914f9eab64e45fcb8
-
SHA256
55a19528717a6c4c7b21caf61989aba8338ed7b12bacd69b5bc97526bfc9c077
-
SHA512
b5cbe97b166dd8bfe80d188dbe4acbb931242477dde0347c60fe0792fade23d4b14c8b70c99497302480f0617f320685a50584d00e33d252a914de81fde516b0
-
SSDEEP
12288:GMrwy90HtDAxPm1Q9yUStQLJtUbshFnSw:iyItePmG9k8tUbESw
Static task
static1
Behavioral task
behavioral1
Sample
55a19528717a6c4c7b21caf61989aba8338ed7b12bacd69b5bc97526bfc9c077.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
55a19528717a6c4c7b21caf61989aba8338ed7b12bacd69b5bc97526bfc9c077
-
Size
530KB
-
MD5
30843c7d717e1963ac1011dd3a24688c
-
SHA1
8e372226bb0c5bcf09966e0914f9eab64e45fcb8
-
SHA256
55a19528717a6c4c7b21caf61989aba8338ed7b12bacd69b5bc97526bfc9c077
-
SHA512
b5cbe97b166dd8bfe80d188dbe4acbb931242477dde0347c60fe0792fade23d4b14c8b70c99497302480f0617f320685a50584d00e33d252a914de81fde516b0
-
SSDEEP
12288:GMrwy90HtDAxPm1Q9yUStQLJtUbshFnSw:iyItePmG9k8tUbESw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1