General
-
Target
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
Size
522KB
-
Sample
241105-gzy39svrgy
-
MD5
d48698d44239f63c8cb139db6051cb8d
-
SHA1
9e9e24ca9fca36f16d075f390020730a392055cd
-
SHA256
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
SHA512
69fe4d28d0202253c04e383ba0f88134d6ec5e7d8decc68fffa4917b6695fef371ed6bc5768d14ced367f328d916a96cb922d0fd451f27bdda2bf9e4e4a3fd99
-
SSDEEP
12288:LMrny90+w/2HnZ4VBUBgz+Cpmy87c4UlzWK/bU28XlgL:8yA2HOVIn79UYKoDeL
Static task
static1
Behavioral task
behavioral1
Sample
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
Size
522KB
-
MD5
d48698d44239f63c8cb139db6051cb8d
-
SHA1
9e9e24ca9fca36f16d075f390020730a392055cd
-
SHA256
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
SHA512
69fe4d28d0202253c04e383ba0f88134d6ec5e7d8decc68fffa4917b6695fef371ed6bc5768d14ced367f328d916a96cb922d0fd451f27bdda2bf9e4e4a3fd99
-
SSDEEP
12288:LMrny90+w/2HnZ4VBUBgz+Cpmy87c4UlzWK/bU28XlgL:8yA2HOVIn79UYKoDeL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1