General
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
Size
534KB
-
Sample
241105-p28z9atnhl
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
Static task
static1
Behavioral task
behavioral1
Sample
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
Size
534KB
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1