General
-
Target
84c1f50135916b9dbb7bf4285125c8ab2828c318c5e18459dcf41906131a30ec
-
Size
534KB
-
Sample
241105-pktt1atlal
-
MD5
b7b7f7cacb954d3de0964dcbc29bb696
-
SHA1
2186140ec2340fe8f120c49072356a713cd2632f
-
SHA256
84c1f50135916b9dbb7bf4285125c8ab2828c318c5e18459dcf41906131a30ec
-
SHA512
862bb06d88073281c93a07a4ae6c049dfae3407fb43cc49c7a7b2c4312d0ee29770b4512de6556c3cc1000ba948be52fcd50ae4fd0fac41bdffa9f4f67ec0021
-
SSDEEP
12288:7Mr4y90ZipOcFB5uXjtAzi2kzpbQW572DounsBV:Ty+ipxbsjtA/kztQKKDlsBV
Static task
static1
Behavioral task
behavioral1
Sample
84c1f50135916b9dbb7bf4285125c8ab2828c318c5e18459dcf41906131a30ec.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
84c1f50135916b9dbb7bf4285125c8ab2828c318c5e18459dcf41906131a30ec
-
Size
534KB
-
MD5
b7b7f7cacb954d3de0964dcbc29bb696
-
SHA1
2186140ec2340fe8f120c49072356a713cd2632f
-
SHA256
84c1f50135916b9dbb7bf4285125c8ab2828c318c5e18459dcf41906131a30ec
-
SHA512
862bb06d88073281c93a07a4ae6c049dfae3407fb43cc49c7a7b2c4312d0ee29770b4512de6556c3cc1000ba948be52fcd50ae4fd0fac41bdffa9f4f67ec0021
-
SSDEEP
12288:7Mr4y90ZipOcFB5uXjtAzi2kzpbQW572DounsBV:Ty+ipxbsjtA/kztQKKDlsBV
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1