General
-
Target
244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50
-
Size
521KB
-
Sample
241105-l2r5ysygmc
-
MD5
096bf50907f1730896bfff4183a45c33
-
SHA1
bb83c6f7bbc4dca30c9d3db2a318e958430056f9
-
SHA256
244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50
-
SHA512
d10a2001253fb11c483fcc132ae725b51cddfe2a1604ac0baa362b7f85f6d826fbcbc47b8b17eef7794cafbdebe5da041508e377bf9b711269d954bfe51c9d7e
-
SSDEEP
12288:iMryy904BCfmxEwrRMH6qyDm8X7DT7+R:Iy9iPH6qyDbTSR
Static task
static1
Behavioral task
behavioral1
Sample
244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50
-
Size
521KB
-
MD5
096bf50907f1730896bfff4183a45c33
-
SHA1
bb83c6f7bbc4dca30c9d3db2a318e958430056f9
-
SHA256
244b24acdbea146c2718a08b2fa1ce43436c2c41a481884b6e81cf8fec779b50
-
SHA512
d10a2001253fb11c483fcc132ae725b51cddfe2a1604ac0baa362b7f85f6d826fbcbc47b8b17eef7794cafbdebe5da041508e377bf9b711269d954bfe51c9d7e
-
SSDEEP
12288:iMryy904BCfmxEwrRMH6qyDm8X7DT7+R:Iy9iPH6qyDbTSR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1