General
-
Target
0d7b4da1cc824ce32ebfb0b6c7aa625da097a937ebec2d0db5abbaa99a690c20
-
Size
530KB
-
Sample
241105-3n6jvszqey
-
MD5
74a0c83a2dd7d82691dfe765bf5a8983
-
SHA1
1dedaaa6c05f21d3b9c29f37e45ce2010a682e63
-
SHA256
0d7b4da1cc824ce32ebfb0b6c7aa625da097a937ebec2d0db5abbaa99a690c20
-
SHA512
582a4ab7bca80deaa7841c0eb17860d20811a7de8d26dc50250fe3b549725fc85eb283983e8238c6495c656cbdd846d405d182f3a0f62b277a0444cf293513e9
-
SSDEEP
12288:gMr4y90QhUJDav4cCW3MXlKonQfqBn04oLRA4RV4kOqN5g:IyfuPcH2kuQyOZL4kxK
Static task
static1
Behavioral task
behavioral1
Sample
0d7b4da1cc824ce32ebfb0b6c7aa625da097a937ebec2d0db5abbaa99a690c20.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
0d7b4da1cc824ce32ebfb0b6c7aa625da097a937ebec2d0db5abbaa99a690c20
-
Size
530KB
-
MD5
74a0c83a2dd7d82691dfe765bf5a8983
-
SHA1
1dedaaa6c05f21d3b9c29f37e45ce2010a682e63
-
SHA256
0d7b4da1cc824ce32ebfb0b6c7aa625da097a937ebec2d0db5abbaa99a690c20
-
SHA512
582a4ab7bca80deaa7841c0eb17860d20811a7de8d26dc50250fe3b549725fc85eb283983e8238c6495c656cbdd846d405d182f3a0f62b277a0444cf293513e9
-
SSDEEP
12288:gMr4y90QhUJDav4cCW3MXlKonQfqBn04oLRA4RV4kOqN5g:IyfuPcH2kuQyOZL4kxK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1