General
-
Target
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb
-
Size
683KB
-
Sample
241105-mjnv9aynav
-
MD5
f1b1e51677bed410b910429d38f5ced9
-
SHA1
f482d3ac2fa31eb8d21b07027839de8d013f17ab
-
SHA256
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb
-
SHA512
7b8675dd97ba514237a405c33cde29a04ab633dd6cede615df5537c0be3d7c9f3ac22a156afa7cb33d367a28ac382d13a1983e32a6c71066ddefc7f845279338
-
SSDEEP
12288:gMrQy908sc/4TTzzvV9MgJktmX5wlStJUgDmNL3x7in4:Ay7smCzzd9MgUcwcBmNLS4
Static task
static1
Behavioral task
behavioral1
Sample
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb
-
Size
683KB
-
MD5
f1b1e51677bed410b910429d38f5ced9
-
SHA1
f482d3ac2fa31eb8d21b07027839de8d013f17ab
-
SHA256
a40a12683d2e2019ebae237f860f219de7d62ef444fedb03754b0683eb1e47fb
-
SHA512
7b8675dd97ba514237a405c33cde29a04ab633dd6cede615df5537c0be3d7c9f3ac22a156afa7cb33d367a28ac382d13a1983e32a6c71066ddefc7f845279338
-
SSDEEP
12288:gMrQy908sc/4TTzzvV9MgJktmX5wlStJUgDmNL3x7in4:Ay7smCzzd9MgUcwcBmNLS4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1