General
-
Target
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83
-
Size
678KB
-
Sample
241105-kzqnns1kcr
-
MD5
bf4d634278ef305a12bc2d8cb851d861
-
SHA1
1c6fb7dc5b105a0dc13f533701dea51ffbf82c3b
-
SHA256
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83
-
SHA512
66755ecbc285156c76e51f9f83822f07db25de14bb10560f1ffaa42831ebfd721cd652f5b6def3fdde221a875e2075e655498fe8f95dd0fc7bea159b487fb390
-
SSDEEP
12288:lMr6y90LAgMAnco2Kt2G73MU8q0A1ifUsKSu1FZdGi/zaEhd6gZpBXr:zyJdAcK8X81n+4zaCMgtXr
Static task
static1
Behavioral task
behavioral1
Sample
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83
-
Size
678KB
-
MD5
bf4d634278ef305a12bc2d8cb851d861
-
SHA1
1c6fb7dc5b105a0dc13f533701dea51ffbf82c3b
-
SHA256
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83
-
SHA512
66755ecbc285156c76e51f9f83822f07db25de14bb10560f1ffaa42831ebfd721cd652f5b6def3fdde221a875e2075e655498fe8f95dd0fc7bea159b487fb390
-
SSDEEP
12288:lMr6y90LAgMAnco2Kt2G73MU8q0A1ifUsKSu1FZdGi/zaEhd6gZpBXr:zyJdAcK8X81n+4zaCMgtXr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1