General
-
Target
c12dab3feb5192c9840e3b1f16c85cba060ee239e1b2ba4925995a0f684d86e3
-
Size
536KB
-
Sample
241105-nljjzszfpd
-
MD5
c82b80ea26caf3a4c43333a2aa410f3b
-
SHA1
e2329882cf812d6a3694551d30a9ea9ee8b16bc2
-
SHA256
c12dab3feb5192c9840e3b1f16c85cba060ee239e1b2ba4925995a0f684d86e3
-
SHA512
0587d2d5594a1081fcfeeec6ddd40fa225a2da30d3e8c5bf54eef029813c89c82b79c3cc4e8fde21701aae7294e632c25e42356c75bbc54260798b9544c3e77c
-
SSDEEP
12288:uMrdy90eU6PMsSJIHE8pOxDcNNKzdNSYLC9n2ynKFfJW:fyLPbPkFcNNKCYg/
Static task
static1
Behavioral task
behavioral1
Sample
c12dab3feb5192c9840e3b1f16c85cba060ee239e1b2ba4925995a0f684d86e3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c12dab3feb5192c9840e3b1f16c85cba060ee239e1b2ba4925995a0f684d86e3
-
Size
536KB
-
MD5
c82b80ea26caf3a4c43333a2aa410f3b
-
SHA1
e2329882cf812d6a3694551d30a9ea9ee8b16bc2
-
SHA256
c12dab3feb5192c9840e3b1f16c85cba060ee239e1b2ba4925995a0f684d86e3
-
SHA512
0587d2d5594a1081fcfeeec6ddd40fa225a2da30d3e8c5bf54eef029813c89c82b79c3cc4e8fde21701aae7294e632c25e42356c75bbc54260798b9544c3e77c
-
SSDEEP
12288:uMrdy90eU6PMsSJIHE8pOxDcNNKzdNSYLC9n2ynKFfJW:fyLPbPkFcNNKCYg/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1