General
-
Target
a8ac018a2308467311da99240badca2c319721ccb7f30aa70d173e4caf0891b2
-
Size
665KB
-
Sample
241105-j1htsaxjbs
-
MD5
83427aa1efe3f6d66b75ecde5d9a66e0
-
SHA1
540cebceb88d15c7c80f8a8959b767c194c2a6fe
-
SHA256
a8ac018a2308467311da99240badca2c319721ccb7f30aa70d173e4caf0891b2
-
SHA512
7d3e48d84bf0bdc7e0ff1de3e37d96c021f21c96c49d5a16bb0739b0640a496a9d85c1f06530b466629986951fc5609cbb93bc583fa5f964045e972d09733d15
-
SSDEEP
12288:1MrOy90mn/BT+uDepTE6NQPnpUn+wgDDeyO8JNN8bBaz4LGUMtm:Hy1Jaua5yQQzJNN8m4rMtm
Static task
static1
Behavioral task
behavioral1
Sample
a8ac018a2308467311da99240badca2c319721ccb7f30aa70d173e4caf0891b2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a8ac018a2308467311da99240badca2c319721ccb7f30aa70d173e4caf0891b2
-
Size
665KB
-
MD5
83427aa1efe3f6d66b75ecde5d9a66e0
-
SHA1
540cebceb88d15c7c80f8a8959b767c194c2a6fe
-
SHA256
a8ac018a2308467311da99240badca2c319721ccb7f30aa70d173e4caf0891b2
-
SHA512
7d3e48d84bf0bdc7e0ff1de3e37d96c021f21c96c49d5a16bb0739b0640a496a9d85c1f06530b466629986951fc5609cbb93bc583fa5f964045e972d09733d15
-
SSDEEP
12288:1MrOy90mn/BT+uDepTE6NQPnpUn+wgDDeyO8JNN8bBaz4LGUMtm:Hy1Jaua5yQQzJNN8m4rMtm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1