General
-
Target
f91036d0823866674e863fb4d31a8d74fb5da21d4b09239db18b9a432e253072
-
Size
666KB
-
Sample
241105-pseeaasarn
-
MD5
dc50913d8f46af624f94cfc4904ed99a
-
SHA1
94dcc6014b2e3e67f314aed1e832c2c9389ac253
-
SHA256
f91036d0823866674e863fb4d31a8d74fb5da21d4b09239db18b9a432e253072
-
SHA512
5e424401e684828bdd5c216ba7f6b8f1bab7f710fd3c65d3d4fa752eb8bec6ed11c3529d84a292bcf473553111e5d1eaf8ecbe3dd4aa7d6878fd7c435002ef4b
-
SSDEEP
12288:UMrqy9015/AYAXt/vY+tNU467gro/NSKNrSfDIli+7y1rUM23/wuGJJBIwfVC:myCDOt/3NU7g4gDa/wrQPwuGt7C
Static task
static1
Behavioral task
behavioral1
Sample
f91036d0823866674e863fb4d31a8d74fb5da21d4b09239db18b9a432e253072.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f91036d0823866674e863fb4d31a8d74fb5da21d4b09239db18b9a432e253072
-
Size
666KB
-
MD5
dc50913d8f46af624f94cfc4904ed99a
-
SHA1
94dcc6014b2e3e67f314aed1e832c2c9389ac253
-
SHA256
f91036d0823866674e863fb4d31a8d74fb5da21d4b09239db18b9a432e253072
-
SHA512
5e424401e684828bdd5c216ba7f6b8f1bab7f710fd3c65d3d4fa752eb8bec6ed11c3529d84a292bcf473553111e5d1eaf8ecbe3dd4aa7d6878fd7c435002ef4b
-
SSDEEP
12288:UMrqy9015/AYAXt/vY+tNU467gro/NSKNrSfDIli+7y1rUM23/wuGJJBIwfVC:myCDOt/3NU7g4gDa/wrQPwuGt7C
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1