General
-
Target
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36
-
Size
658KB
-
Sample
241105-p5cffsscnk
-
MD5
d93d0bc1ed0cc99097245fb5ff3561ee
-
SHA1
df3ab8a48517ed615626e6dae383502c20500d54
-
SHA256
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36
-
SHA512
a3e5570a360f358ca9bc65fba3f8d6fd236c8f2d1703caa300c1a8ac8a5e052f79aafc92004d8b4a0bee909474401b1192cd39be360a1d95e320eb3ebccde97a
-
SSDEEP
12288:4Mrdy90hWzutru/Byd5pK3FkyU8BRi9j0XTYKjFQoqBiPed6hbfxgy:lycruZyd+3yJ8BRW+5RQDtUhdgy
Static task
static1
Behavioral task
behavioral1
Sample
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36
-
Size
658KB
-
MD5
d93d0bc1ed0cc99097245fb5ff3561ee
-
SHA1
df3ab8a48517ed615626e6dae383502c20500d54
-
SHA256
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36
-
SHA512
a3e5570a360f358ca9bc65fba3f8d6fd236c8f2d1703caa300c1a8ac8a5e052f79aafc92004d8b4a0bee909474401b1192cd39be360a1d95e320eb3ebccde97a
-
SSDEEP
12288:4Mrdy90hWzutru/Byd5pK3FkyU8BRi9j0XTYKjFQoqBiPed6hbfxgy:lycruZyd+3yJ8BRW+5RQDtUhdgy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1