General
-
Target
a7992dea8496beacf6ae729b4de36942b928c0110d1ab15db6e1bd5e02fdcd3c
-
Size
548KB
-
Sample
241105-fy1p2axqej
-
MD5
13489517561afabc7a532de87aca0ec7
-
SHA1
d41f94b028c9aa79636546e8207d49b9189dcaae
-
SHA256
a7992dea8496beacf6ae729b4de36942b928c0110d1ab15db6e1bd5e02fdcd3c
-
SHA512
9754ec3c184948c13206fe546ea54f32f047471e75055e32db9e14a3bcce611c574c7799f955fc711f86242f3039eff01421ba42bcd1221c1462f3d6e6a3c2af
-
SSDEEP
12288:dMrNy90zUw8HLUR2+RBHiKvREwpij8iGi8WCIDRNPM28XlYhf:gybweUR2itilwpijB9o2gahf
Static task
static1
Behavioral task
behavioral1
Sample
a7992dea8496beacf6ae729b4de36942b928c0110d1ab15db6e1bd5e02fdcd3c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a7992dea8496beacf6ae729b4de36942b928c0110d1ab15db6e1bd5e02fdcd3c
-
Size
548KB
-
MD5
13489517561afabc7a532de87aca0ec7
-
SHA1
d41f94b028c9aa79636546e8207d49b9189dcaae
-
SHA256
a7992dea8496beacf6ae729b4de36942b928c0110d1ab15db6e1bd5e02fdcd3c
-
SHA512
9754ec3c184948c13206fe546ea54f32f047471e75055e32db9e14a3bcce611c574c7799f955fc711f86242f3039eff01421ba42bcd1221c1462f3d6e6a3c2af
-
SSDEEP
12288:dMrNy90zUw8HLUR2+RBHiKvREwpij8iGi8WCIDRNPM28XlYhf:gybweUR2itilwpijB9o2gahf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1