General
-
Target
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f
-
Size
536KB
-
Sample
241105-pwcd4asblm
-
MD5
124dce24cadd7cce7ca3ce1f881f8840
-
SHA1
36ed8ca9d61023587b3eef5cb9066ea6f815cb16
-
SHA256
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f
-
SHA512
fc075c6cdb05278ee569051f9453c24af81bfbcc6d29df15341e1f218692db2c531b0d33a9a7c3129d2fd969eefff7c5562db05dc20b8a29458db76fef648ee9
-
SSDEEP
12288:dMrny906GK987QzzWA2+NGzD5BgLrmkdf6:OyXMQR2+NG3g/C
Static task
static1
Behavioral task
behavioral1
Sample
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f
-
Size
536KB
-
MD5
124dce24cadd7cce7ca3ce1f881f8840
-
SHA1
36ed8ca9d61023587b3eef5cb9066ea6f815cb16
-
SHA256
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f
-
SHA512
fc075c6cdb05278ee569051f9453c24af81bfbcc6d29df15341e1f218692db2c531b0d33a9a7c3129d2fd969eefff7c5562db05dc20b8a29458db76fef648ee9
-
SSDEEP
12288:dMrny906GK987QzzWA2+NGzD5BgLrmkdf6:OyXMQR2+NG3g/C
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1