General
-
Target
3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131
-
Size
657KB
-
Sample
241105-qcm7xs1fqd
-
MD5
71fda2d82433fabd3940456f37c226e0
-
SHA1
df6622ab42df8554c9897d089a91026d3fb26129
-
SHA256
3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131
-
SHA512
6678ae1d3c0525decefa579c761c7b0c435573bc5dda1b77d2fa23b313f0361efb75179332bccd9d4653cd6f88a8ed2a539b457870a4111b7a69b3ec720ea09e
-
SSDEEP
12288:4MrOy90wfr44JTuP8W+06JXIyqKEjS96D7RGtl7Yi4+EVZxm/Wn9TL0:Wyi4JKP1jTLxPRGHYj+EVz3Tg
Static task
static1
Behavioral task
behavioral1
Sample
3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131
-
Size
657KB
-
MD5
71fda2d82433fabd3940456f37c226e0
-
SHA1
df6622ab42df8554c9897d089a91026d3fb26129
-
SHA256
3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131
-
SHA512
6678ae1d3c0525decefa579c761c7b0c435573bc5dda1b77d2fa23b313f0361efb75179332bccd9d4653cd6f88a8ed2a539b457870a4111b7a69b3ec720ea09e
-
SSDEEP
12288:4MrOy90wfr44JTuP8W+06JXIyqKEjS96D7RGtl7Yi4+EVZxm/Wn9TL0:Wyi4JKP1jTLxPRGHYj+EVz3Tg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1