General
-
Target
7aca6e7d71d7a407263e478b92bd8a380cacebeb7d4e376f52ea5f090c10ae9a
-
Size
673KB
-
Sample
241105-lgna9s1mgk
-
MD5
57b0b7a272f71bdfcd984943aea6e5a4
-
SHA1
4a63ca0ff89c852d5a11984cf17ec71f3e6e45af
-
SHA256
7aca6e7d71d7a407263e478b92bd8a380cacebeb7d4e376f52ea5f090c10ae9a
-
SHA512
82cb2c2a6e14889428d8639e3cfc916773dd8bb06638d4d36a82f1621fa90da6c4970b6dd6e8f6b3a9ca37ab7d452d55776894fc0c78ad73e87f62b6a054b842
-
SSDEEP
12288:qMrJy901Rfy5pCibZOvLKGmC+IrmxE278xY4omiV+YHZ36pXHtpUn+EWxu2:nyUQfJ9OvLvqE278G4o46ARHTU+1h
Static task
static1
Behavioral task
behavioral1
Sample
7aca6e7d71d7a407263e478b92bd8a380cacebeb7d4e376f52ea5f090c10ae9a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7aca6e7d71d7a407263e478b92bd8a380cacebeb7d4e376f52ea5f090c10ae9a
-
Size
673KB
-
MD5
57b0b7a272f71bdfcd984943aea6e5a4
-
SHA1
4a63ca0ff89c852d5a11984cf17ec71f3e6e45af
-
SHA256
7aca6e7d71d7a407263e478b92bd8a380cacebeb7d4e376f52ea5f090c10ae9a
-
SHA512
82cb2c2a6e14889428d8639e3cfc916773dd8bb06638d4d36a82f1621fa90da6c4970b6dd6e8f6b3a9ca37ab7d452d55776894fc0c78ad73e87f62b6a054b842
-
SSDEEP
12288:qMrJy901Rfy5pCibZOvLKGmC+IrmxE278xY4omiV+YHZ36pXHtpUn+EWxu2:nyUQfJ9OvLvqE278G4o46ARHTU+1h
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1