General
-
Target
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49
-
Size
530KB
-
Sample
241105-pb3qjstjhj
-
MD5
36eeb28cc41c90ebb7b37566a64b41e8
-
SHA1
f6c49647b25bc49393bef03150f0102436e0732f
-
SHA256
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49
-
SHA512
69802b9c9ce31233830294c81fbf55f3f192c2218ee12130f73ce41fb7308d02bdefc54266ad7ee068459184e1799ba568521842a488a7556cb908b8a6067da4
-
SSDEEP
12288:IMr6y909t3lb96i16KnPR5f5KXa/6mCgoh4tigRcL:yy+t3lJ6I6KPHA1mCgohF0cL
Static task
static1
Behavioral task
behavioral1
Sample
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49
-
Size
530KB
-
MD5
36eeb28cc41c90ebb7b37566a64b41e8
-
SHA1
f6c49647b25bc49393bef03150f0102436e0732f
-
SHA256
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49
-
SHA512
69802b9c9ce31233830294c81fbf55f3f192c2218ee12130f73ce41fb7308d02bdefc54266ad7ee068459184e1799ba568521842a488a7556cb908b8a6067da4
-
SSDEEP
12288:IMr6y909t3lb96i16KnPR5f5KXa/6mCgoh4tigRcL:yy+t3lJ6I6KPHA1mCgohF0cL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1