General
-
Target
7d0103a9261ce4ae5ef64b82dad56a13bc2c12f539c81b1b2c99e908f43ad1f3
-
Size
673KB
-
Sample
241105-m81lcayrcw
-
MD5
044653f3f4f50b322282e4e6ab0235d9
-
SHA1
be823a906374907b2a25c90c8668c9657aec0d87
-
SHA256
7d0103a9261ce4ae5ef64b82dad56a13bc2c12f539c81b1b2c99e908f43ad1f3
-
SHA512
6f3cc333487ff4826b788f23f37590619e3bd52b973860e5cf20baf4972285dd7951bac05c5021153193233ab21d2a734e8748ff3208d930c6ed72c01a8c230e
-
SSDEEP
12288:ZMr2y90lRCR2zAPbWLyZxn+UmUupF32MdFDug5Urrq6f8VuWhMWKRM82L:Ty8rzUWGZN1upF32yUrq62ua0u
Static task
static1
Behavioral task
behavioral1
Sample
7d0103a9261ce4ae5ef64b82dad56a13bc2c12f539c81b1b2c99e908f43ad1f3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7d0103a9261ce4ae5ef64b82dad56a13bc2c12f539c81b1b2c99e908f43ad1f3
-
Size
673KB
-
MD5
044653f3f4f50b322282e4e6ab0235d9
-
SHA1
be823a906374907b2a25c90c8668c9657aec0d87
-
SHA256
7d0103a9261ce4ae5ef64b82dad56a13bc2c12f539c81b1b2c99e908f43ad1f3
-
SHA512
6f3cc333487ff4826b788f23f37590619e3bd52b973860e5cf20baf4972285dd7951bac05c5021153193233ab21d2a734e8748ff3208d930c6ed72c01a8c230e
-
SSDEEP
12288:ZMr2y90lRCR2zAPbWLyZxn+UmUupF32MdFDug5Urrq6f8VuWhMWKRM82L:Ty8rzUWGZN1upF32yUrq62ua0u
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1