General
-
Target
2528c88b773e0e3d6c56810bf5c97209567066dba45c4b9d1754eff7636e7a80
-
Size
531KB
-
Sample
241105-q5nn6a1pfy
-
MD5
f6f4d2771228019c73a551147687a1f1
-
SHA1
00249fd41d22da72aec48223c5dc19c9c2b96db3
-
SHA256
2528c88b773e0e3d6c56810bf5c97209567066dba45c4b9d1754eff7636e7a80
-
SHA512
5518545d1c943832f578715dd458c5ca7ce7e459f26047266e61ebb5ef3612afc98d5e83ee7526bbbb581c43f8aecb1eb606b74c17d06b2315d7411391953d71
-
SSDEEP
12288:JMr0y90XWDKUl6sXAs3zpKgzdY4e/Sah74GG80/U:FyNTl6iz0gMSah74GG84U
Static task
static1
Behavioral task
behavioral1
Sample
2528c88b773e0e3d6c56810bf5c97209567066dba45c4b9d1754eff7636e7a80.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2528c88b773e0e3d6c56810bf5c97209567066dba45c4b9d1754eff7636e7a80
-
Size
531KB
-
MD5
f6f4d2771228019c73a551147687a1f1
-
SHA1
00249fd41d22da72aec48223c5dc19c9c2b96db3
-
SHA256
2528c88b773e0e3d6c56810bf5c97209567066dba45c4b9d1754eff7636e7a80
-
SHA512
5518545d1c943832f578715dd458c5ca7ce7e459f26047266e61ebb5ef3612afc98d5e83ee7526bbbb581c43f8aecb1eb606b74c17d06b2315d7411391953d71
-
SSDEEP
12288:JMr0y90XWDKUl6sXAs3zpKgzdY4e/Sah74GG80/U:FyNTl6iz0gMSah74GG84U
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1