General
-
Target
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc
-
Size
658KB
-
Sample
241105-m2pv9szcrg
-
MD5
0f9fa37ac6480d890f23496da7978880
-
SHA1
7725c9e32f36f85a6bdee912bb636c980ee415b4
-
SHA256
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc
-
SHA512
775e2a577d56458271983606deb9dff8f12ab862990006794b9467027f01b83e1dca66b3c2ab9b5fa3ad6bd734bf8ecf6c15022c0a99b6b23d4b40ac2eb900b2
-
SSDEEP
12288:+Mrgy90YFcPRLqa6rWgudw10+N+s3nK5l7MGr+EUZxIQAbcclD:yyjiJormC1gsXIMG+EUzIQd6
Static task
static1
Behavioral task
behavioral1
Sample
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc
-
Size
658KB
-
MD5
0f9fa37ac6480d890f23496da7978880
-
SHA1
7725c9e32f36f85a6bdee912bb636c980ee415b4
-
SHA256
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc
-
SHA512
775e2a577d56458271983606deb9dff8f12ab862990006794b9467027f01b83e1dca66b3c2ab9b5fa3ad6bd734bf8ecf6c15022c0a99b6b23d4b40ac2eb900b2
-
SSDEEP
12288:+Mrgy90YFcPRLqa6rWgudw10+N+s3nK5l7MGr+EUZxIQAbcclD:yyjiJormC1gsXIMG+EUzIQd6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1