General
-
Target
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
Size
522KB
-
Sample
241105-myaxyazcma
-
MD5
1f7049fec0de8df73f585d32242e52f6
-
SHA1
e80ed30d4527c6a790fe0ed2a2eaf3a3ea1d9dc8
-
SHA256
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
SHA512
42a179759fc60a4074a220a460d66ac68e79c8f422f1d8689cb1854e8e9257093816a874eb86f69baa3896ac100cfd5e1ac56381e5f759ac92b8c81fd9de801d
-
SSDEEP
12288:OMrLy90FjMwNEWYJPv8ze44azWHw5Xv8Je0h2x:9yigmcUzX4jHT5C
Static task
static1
Behavioral task
behavioral1
Sample
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
Size
522KB
-
MD5
1f7049fec0de8df73f585d32242e52f6
-
SHA1
e80ed30d4527c6a790fe0ed2a2eaf3a3ea1d9dc8
-
SHA256
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
SHA512
42a179759fc60a4074a220a460d66ac68e79c8f422f1d8689cb1854e8e9257093816a874eb86f69baa3896ac100cfd5e1ac56381e5f759ac92b8c81fd9de801d
-
SSDEEP
12288:OMrLy90FjMwNEWYJPv8ze44azWHw5Xv8Je0h2x:9yigmcUzX4jHT5C
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1