General
-
Target
7954e1852c25d9f638620bb636f94c49a3d1999983d4a8d81ad88f4cbe86c888
-
Size
531KB
-
Sample
241105-nksq9s1crn
-
MD5
5ef250fa52fbfb7223eeb695c4bb09c2
-
SHA1
56ceebda1960788e9db4036f9dc1de74aac9b967
-
SHA256
7954e1852c25d9f638620bb636f94c49a3d1999983d4a8d81ad88f4cbe86c888
-
SHA512
faca3fa57171b67c65593f65a34e9407bed6770378fa0bc288a589d8117dd9a42ffa7493bb8f9fcf47993dccac4200701e0b69076aa8e2062286ed36486ece22
-
SSDEEP
12288:ZMr0y90zGhKsytkWnmXrc7P5kHqialD5mwuXMj2kLZtvN:ByCY7iP2Izdj2k9H
Static task
static1
Behavioral task
behavioral1
Sample
7954e1852c25d9f638620bb636f94c49a3d1999983d4a8d81ad88f4cbe86c888.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7954e1852c25d9f638620bb636f94c49a3d1999983d4a8d81ad88f4cbe86c888
-
Size
531KB
-
MD5
5ef250fa52fbfb7223eeb695c4bb09c2
-
SHA1
56ceebda1960788e9db4036f9dc1de74aac9b967
-
SHA256
7954e1852c25d9f638620bb636f94c49a3d1999983d4a8d81ad88f4cbe86c888
-
SHA512
faca3fa57171b67c65593f65a34e9407bed6770378fa0bc288a589d8117dd9a42ffa7493bb8f9fcf47993dccac4200701e0b69076aa8e2062286ed36486ece22
-
SSDEEP
12288:ZMr0y90zGhKsytkWnmXrc7P5kHqialD5mwuXMj2kLZtvN:ByCY7iP2Izdj2k9H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1