General
-
Target
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95
-
Size
530KB
-
Sample
241105-rbae4svmaq
-
MD5
f74832accaf28a4f8804a01114d7b4d3
-
SHA1
05c7d413390cc544cac02965078c3ab547292aff
-
SHA256
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95
-
SHA512
c6dcdbac37b190d962c06595a4d734899e50c7356c315120904df53e1a0c8e21994ca448393a7bc57409c52ca8a100fea1468f86436928bb57ff25a0c577b783
-
SSDEEP
12288:gMrUy90RlAs6JLWxODILLTz3wCV1KaYQ7qBtkcEDyVDUnKN7:Eykt4ILPzACV0lQuyQx
Static task
static1
Behavioral task
behavioral1
Sample
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95
-
Size
530KB
-
MD5
f74832accaf28a4f8804a01114d7b4d3
-
SHA1
05c7d413390cc544cac02965078c3ab547292aff
-
SHA256
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95
-
SHA512
c6dcdbac37b190d962c06595a4d734899e50c7356c315120904df53e1a0c8e21994ca448393a7bc57409c52ca8a100fea1468f86436928bb57ff25a0c577b783
-
SSDEEP
12288:gMrUy90RlAs6JLWxODILLTz3wCV1KaYQ7qBtkcEDyVDUnKN7:Eykt4ILPzACV0lQuyQx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1