General
-
Target
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f
-
Size
688KB
-
Sample
241105-qsnhmasfpm
-
MD5
8e56bc06899a6270d60c2cae1f164cf3
-
SHA1
51df828999f0142bb34df665a306a2b769eae137
-
SHA256
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f
-
SHA512
a3545ba1f993d9d2794b1e3fb744c72d58f050f763b356ebb41b8d60b8a62313f0bc833c647b1163a85a98014ba739f3336e1143427a2a7a87dff2af179a0a5f
-
SSDEEP
12288:GMrGy90pPRfGqcK+W/BqPA2+xfDXlda4T+pIFNMtpXga+RHM4:EyURfGqcK+AB+Avxr/aG1jM/ga+Rs4
Static task
static1
Behavioral task
behavioral1
Sample
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f
-
Size
688KB
-
MD5
8e56bc06899a6270d60c2cae1f164cf3
-
SHA1
51df828999f0142bb34df665a306a2b769eae137
-
SHA256
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f
-
SHA512
a3545ba1f993d9d2794b1e3fb744c72d58f050f763b356ebb41b8d60b8a62313f0bc833c647b1163a85a98014ba739f3336e1143427a2a7a87dff2af179a0a5f
-
SSDEEP
12288:GMrGy90pPRfGqcK+W/BqPA2+xfDXlda4T+pIFNMtpXga+RHM4:EyURfGqcK+AB+Avxr/aG1jM/ga+Rs4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1