General
-
Target
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7
-
Size
673KB
-
Sample
241105-n8qltazna1
-
MD5
b0bccaa64cee14f004e43bae2db7ed28
-
SHA1
5084277dc6fbd73f2bc4edbc20f62754be63b4a0
-
SHA256
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7
-
SHA512
015339636540dc046b19d76ca356879e92f16b11b3852c032d81003b68960585a4fe2204233c9e857a74953b457715920974c344ec03d26c14ec873ac09c69fd
-
SSDEEP
12288:SMr0y90dIgfD6QrdLdi+/Vbr6VZUd/lK8T5buW4JOau7:Ky23D6A5F8q/t9uLM7
Static task
static1
Behavioral task
behavioral1
Sample
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7
-
Size
673KB
-
MD5
b0bccaa64cee14f004e43bae2db7ed28
-
SHA1
5084277dc6fbd73f2bc4edbc20f62754be63b4a0
-
SHA256
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7
-
SHA512
015339636540dc046b19d76ca356879e92f16b11b3852c032d81003b68960585a4fe2204233c9e857a74953b457715920974c344ec03d26c14ec873ac09c69fd
-
SSDEEP
12288:SMr0y90dIgfD6QrdLdi+/Vbr6VZUd/lK8T5buW4JOau7:Ky23D6A5F8q/t9uLM7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1