General
-
Target
75e49d45230b7149f390f398488320270c8dbb4b74299170c58d93f5a641ddac
-
Size
684KB
-
Sample
241105-n3z83azmdt
-
MD5
85d070014776942fc98269184aa908ea
-
SHA1
e5fa5025c624314c9faa4a3c612350f2b0262969
-
SHA256
75e49d45230b7149f390f398488320270c8dbb4b74299170c58d93f5a641ddac
-
SHA512
f49720eb441d5aa5f6e94972ff8c59bcfa1587877ca8e967f8bf14ed2c18d0a151187361e3415ca1c306c5854d88fa99e5e4b6d926f639b7e40aad8294837073
-
SSDEEP
12288:xMrOy90KHbuIruRlqqOGb6yjC4xR525nLMMSUlkmzL3eL:DybH/y2GtjCE525LcHmzLOL
Static task
static1
Behavioral task
behavioral1
Sample
75e49d45230b7149f390f398488320270c8dbb4b74299170c58d93f5a641ddac.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
75e49d45230b7149f390f398488320270c8dbb4b74299170c58d93f5a641ddac
-
Size
684KB
-
MD5
85d070014776942fc98269184aa908ea
-
SHA1
e5fa5025c624314c9faa4a3c612350f2b0262969
-
SHA256
75e49d45230b7149f390f398488320270c8dbb4b74299170c58d93f5a641ddac
-
SHA512
f49720eb441d5aa5f6e94972ff8c59bcfa1587877ca8e967f8bf14ed2c18d0a151187361e3415ca1c306c5854d88fa99e5e4b6d926f639b7e40aad8294837073
-
SSDEEP
12288:xMrOy90KHbuIruRlqqOGb6yjC4xR525nLMMSUlkmzL3eL:DybH/y2GtjCE525LcHmzLOL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1