General
-
Target
744414b50c123f4ac33617fb6df5089e03d332d6b9a657bdaf8a0a3d8dcf69de
-
Size
537KB
-
Sample
241105-lfr8tsycne
-
MD5
f5562d7443b08e30a1ee75e4d73282a9
-
SHA1
ef9358223c0a4a1fc00cfe94419d89eb4ce9a397
-
SHA256
744414b50c123f4ac33617fb6df5089e03d332d6b9a657bdaf8a0a3d8dcf69de
-
SHA512
eddd71f86184bff1ed53759429a04e3e55ae93d22e16e8e1f6f10b17d1aa789d5dc2c7a8e7605ed73c0a44e3f702f25e9d63defb82d94fb7046744e4b8db34b3
-
SSDEEP
12288:CMr+y90rVWe5JUo7rdW473cSusrUTEHowfU70fHCQJ:4y8VWe5JB7rdHMRsrHIwc727J
Static task
static1
Behavioral task
behavioral1
Sample
744414b50c123f4ac33617fb6df5089e03d332d6b9a657bdaf8a0a3d8dcf69de.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
744414b50c123f4ac33617fb6df5089e03d332d6b9a657bdaf8a0a3d8dcf69de
-
Size
537KB
-
MD5
f5562d7443b08e30a1ee75e4d73282a9
-
SHA1
ef9358223c0a4a1fc00cfe94419d89eb4ce9a397
-
SHA256
744414b50c123f4ac33617fb6df5089e03d332d6b9a657bdaf8a0a3d8dcf69de
-
SHA512
eddd71f86184bff1ed53759429a04e3e55ae93d22e16e8e1f6f10b17d1aa789d5dc2c7a8e7605ed73c0a44e3f702f25e9d63defb82d94fb7046744e4b8db34b3
-
SSDEEP
12288:CMr+y90rVWe5JUo7rdW473cSusrUTEHowfU70fHCQJ:4y8VWe5JB7rdHMRsrHIwc727J
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1