General
-
Target
316fd87dfd8a887524a9d6c6b0247c94c17831e2d376c81804be6678342f3c2a
-
Size
534KB
-
Sample
241105-n1hk8s1erj
-
MD5
5732adff56ad45e7ac7b8c970ac18d45
-
SHA1
845c73c6c053fd5cf6693d00cd338ca3af7ee861
-
SHA256
316fd87dfd8a887524a9d6c6b0247c94c17831e2d376c81804be6678342f3c2a
-
SHA512
163abace0e88ae02c905b68f81d0bc1fd6bb7ce83dd5a2fc8d3601537bf81e3ae6f2559c7f8277da01e54c38299b8186f7adc4996afc8b84a9017d5a7eca4749
-
SSDEEP
12288:hMrCy90tefrJ3D4sB1nq2futiqzzbAWMecA6Rtefb0c:7yyefl3D4CY2flqzXA3eSjeYc
Static task
static1
Behavioral task
behavioral1
Sample
316fd87dfd8a887524a9d6c6b0247c94c17831e2d376c81804be6678342f3c2a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
316fd87dfd8a887524a9d6c6b0247c94c17831e2d376c81804be6678342f3c2a
-
Size
534KB
-
MD5
5732adff56ad45e7ac7b8c970ac18d45
-
SHA1
845c73c6c053fd5cf6693d00cd338ca3af7ee861
-
SHA256
316fd87dfd8a887524a9d6c6b0247c94c17831e2d376c81804be6678342f3c2a
-
SHA512
163abace0e88ae02c905b68f81d0bc1fd6bb7ce83dd5a2fc8d3601537bf81e3ae6f2559c7f8277da01e54c38299b8186f7adc4996afc8b84a9017d5a7eca4749
-
SSDEEP
12288:hMrCy90tefrJ3D4sB1nq2futiqzzbAWMecA6Rtefb0c:7yyefl3D4CY2flqzXA3eSjeYc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1