General
-
Target
48d07ccf519986dbea702cc3f527b258861f34c36a77c2d461cae2961696ce22
-
Size
658KB
-
Sample
241105-hnc74awlc1
-
MD5
94518a12ad8cef89bed882eae06fe075
-
SHA1
fb021449951266d8852a225a39a6ae936de5f8af
-
SHA256
48d07ccf519986dbea702cc3f527b258861f34c36a77c2d461cae2961696ce22
-
SHA512
2c71c96c8fcaa46b23a51476a7273628b0c9bafdc46fa172284ca5471b1311254c90368cc665ccfd43ad78dac941b473aef4c2f8c3ca370f53cb9214afa4d625
-
SSDEEP
12288:TMrCy90IEY6AzF5JpEY3xyua+CDQBSr3E8fFvk+EZZxuYqLmU0p0R:9yD16A1pEGyp4yFvk+EZzNqLmUiq
Static task
static1
Behavioral task
behavioral1
Sample
48d07ccf519986dbea702cc3f527b258861f34c36a77c2d461cae2961696ce22.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
48d07ccf519986dbea702cc3f527b258861f34c36a77c2d461cae2961696ce22
-
Size
658KB
-
MD5
94518a12ad8cef89bed882eae06fe075
-
SHA1
fb021449951266d8852a225a39a6ae936de5f8af
-
SHA256
48d07ccf519986dbea702cc3f527b258861f34c36a77c2d461cae2961696ce22
-
SHA512
2c71c96c8fcaa46b23a51476a7273628b0c9bafdc46fa172284ca5471b1311254c90368cc665ccfd43ad78dac941b473aef4c2f8c3ca370f53cb9214afa4d625
-
SSDEEP
12288:TMrCy90IEY6AzF5JpEY3xyua+CDQBSr3E8fFvk+EZZxuYqLmU0p0R:9yD16A1pEGyp4yFvk+EZzNqLmUiq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1