General
-
Target
1205efca03fe212b7fcf8ffa9f214f11681bce4c829f91d058a641fc29308ae3
-
Size
645KB
-
Sample
241105-fh4fzsvemh
-
MD5
386700ba6c22266a6b14e2d2f0d6c7ac
-
SHA1
6e55eb32b144481181aa58f90434af1f0d68d963
-
SHA256
1205efca03fe212b7fcf8ffa9f214f11681bce4c829f91d058a641fc29308ae3
-
SHA512
f95e43dcff917696ce69a4e2ec2582e589cb27659c28052ce1dadeb460bfa33d6cc7204fc6a5e91ac232eebbbd1f9db4344ed0b090a71bbe3168df72a98ff650
-
SSDEEP
12288:vvUCES4zOqEbErCd1sbreoy0oFTATNOdQ5vaeZleVPneG4WSajWqxK66xCadN:vvU3SeEoqyoFT15SAP4Ua3
Static task
static1
Behavioral task
behavioral1
Sample
7e088f484c5a940a03a5d173fb4c06e16c99c60a7da368d76b933d4a80ffe776.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7e088f484c5a940a03a5d173fb4c06e16c99c60a7da368d76b933d4a80ffe776.exe
-
Size
688KB
-
MD5
62d65c1357b73132cfb89d2cc029df2b
-
SHA1
21eb0d662bdad549cb0870bb2f41307b6c4011bf
-
SHA256
7e088f484c5a940a03a5d173fb4c06e16c99c60a7da368d76b933d4a80ffe776
-
SHA512
d14c5fca136445064c106c6f4bd247bc32e8752d08ebf61181e252cbffca51eabc3c5472c85ec0cfa710cefb8e6ef46ed475791793d82ecb4217e270c6cc4dc9
-
SSDEEP
12288:NMrvy90JLhPmPyWRHZGfn42rRqxXeDqvjVLvXgYas0UXIRUg1PhB:SyYLhP1wZkn42GYYjVTgYaTRJ1v
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1