General
-
Target
d90698512fc88599934667e58a7fdf90c9750b8d628edaa133160c700972ebfa
-
Size
660KB
-
Sample
241105-3jqylszphx
-
MD5
1ad8e3cfa07f49e7d3ba83e6a1231a51
-
SHA1
6de540fa3f5c42a29c22b6b50ea0066aa50bf236
-
SHA256
d90698512fc88599934667e58a7fdf90c9750b8d628edaa133160c700972ebfa
-
SHA512
ee1a6feeeb167aed78b1f4fe34346bd27ee5d7322732dbf5f9a33d0b80ce6f19fd5285dff5250548604877b5b0a6b7c290ace21374c72526fa2be72d3200616d
-
SSDEEP
12288:CMriy90+EWSRIZJCxhpasZ1CvwGxJSF/lRMJGV3ifElCFldljLt:UyMmUyqILx4FoGJiRLfLt
Static task
static1
Behavioral task
behavioral1
Sample
d90698512fc88599934667e58a7fdf90c9750b8d628edaa133160c700972ebfa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d90698512fc88599934667e58a7fdf90c9750b8d628edaa133160c700972ebfa
-
Size
660KB
-
MD5
1ad8e3cfa07f49e7d3ba83e6a1231a51
-
SHA1
6de540fa3f5c42a29c22b6b50ea0066aa50bf236
-
SHA256
d90698512fc88599934667e58a7fdf90c9750b8d628edaa133160c700972ebfa
-
SHA512
ee1a6feeeb167aed78b1f4fe34346bd27ee5d7322732dbf5f9a33d0b80ce6f19fd5285dff5250548604877b5b0a6b7c290ace21374c72526fa2be72d3200616d
-
SSDEEP
12288:CMriy90+EWSRIZJCxhpasZ1CvwGxJSF/lRMJGV3ifElCFldljLt:UyMmUyqILx4FoGJiRLfLt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1