General
-
Target
78adfe2a4152a4cda42c6ce9dd7b001eee6721f72b4c987ca0656dad6c2249ac
-
Size
533KB
-
Sample
241105-laqstaxqbv
-
MD5
80496e717033963f20258f82b9305cc9
-
SHA1
aa72dbdf53b4a00abb6e6a4243d78979d9154678
-
SHA256
78adfe2a4152a4cda42c6ce9dd7b001eee6721f72b4c987ca0656dad6c2249ac
-
SHA512
cfb487e9649794002718c6752893d02e4a2c79bd9f2c85f08f5d4133998bb427c1860bbf8187ed72f470eebdcef0dd0b834947c3be63752b4a45f4beb68b38a5
-
SSDEEP
12288:XMr0y90AQznowxoKczElCQcZtzPSGIii:LyZQX6joYQuzPS3D
Static task
static1
Behavioral task
behavioral1
Sample
78adfe2a4152a4cda42c6ce9dd7b001eee6721f72b4c987ca0656dad6c2249ac.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
78adfe2a4152a4cda42c6ce9dd7b001eee6721f72b4c987ca0656dad6c2249ac
-
Size
533KB
-
MD5
80496e717033963f20258f82b9305cc9
-
SHA1
aa72dbdf53b4a00abb6e6a4243d78979d9154678
-
SHA256
78adfe2a4152a4cda42c6ce9dd7b001eee6721f72b4c987ca0656dad6c2249ac
-
SHA512
cfb487e9649794002718c6752893d02e4a2c79bd9f2c85f08f5d4133998bb427c1860bbf8187ed72f470eebdcef0dd0b834947c3be63752b4a45f4beb68b38a5
-
SSDEEP
12288:XMr0y90AQznowxoKczElCQcZtzPSGIii:LyZQX6joYQuzPS3D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1