General
-
Target
90a68263ee1a97ec5c4a0ea09bb62bb94a321387330fb46d1ace744e95828ffe
-
Size
688KB
-
Sample
241105-lv9fnayfjg
-
MD5
5fd1fbcfe9dd95d8644a421a1693c06d
-
SHA1
33bb9c0cb5422c8fcacf9bc7afd4930da92309b2
-
SHA256
90a68263ee1a97ec5c4a0ea09bb62bb94a321387330fb46d1ace744e95828ffe
-
SHA512
34454de3789d64b0e6cb095dc2f16afd321216ec20316c5d2fc6b78fae5cddee16cf7ae93e2d8633e459c6dd4f4a57813c77f5b118d4b6f28d4f1434db609261
-
SSDEEP
12288:NMrpy90t3Jkelr5Sw53eyviWHJmNPY3TXRMR4nXK:MyO5keltSOeyqcJmezSKXK
Static task
static1
Behavioral task
behavioral1
Sample
90a68263ee1a97ec5c4a0ea09bb62bb94a321387330fb46d1ace744e95828ffe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
90a68263ee1a97ec5c4a0ea09bb62bb94a321387330fb46d1ace744e95828ffe
-
Size
688KB
-
MD5
5fd1fbcfe9dd95d8644a421a1693c06d
-
SHA1
33bb9c0cb5422c8fcacf9bc7afd4930da92309b2
-
SHA256
90a68263ee1a97ec5c4a0ea09bb62bb94a321387330fb46d1ace744e95828ffe
-
SHA512
34454de3789d64b0e6cb095dc2f16afd321216ec20316c5d2fc6b78fae5cddee16cf7ae93e2d8633e459c6dd4f4a57813c77f5b118d4b6f28d4f1434db609261
-
SSDEEP
12288:NMrpy90t3Jkelr5Sw53eyviWHJmNPY3TXRMR4nXK:MyO5keltSOeyqcJmezSKXK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1