General
-
Target
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805
-
Size
662KB
-
Sample
241105-rkfy9a1rgv
-
MD5
0d969de928b2ce43172d0d1eb7827309
-
SHA1
33b50c3fb52424cd9bac6c448835ae7539868df6
-
SHA256
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805
-
SHA512
633cd76e6f595acec0c42a7b62ec94b2c602515fc79ed545e680ab5662eb55a7c387a6500cd7c687993a9a24b53514058acaa0089260d9fce326e64ca3a8c88c
-
SSDEEP
12288:xMr1y90zq/5ok7eA8l2ANSv3BkQom2qCkY69Rm1zdMv8Dj:cyYnNfQom2qCOmBbDj
Static task
static1
Behavioral task
behavioral1
Sample
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805
-
Size
662KB
-
MD5
0d969de928b2ce43172d0d1eb7827309
-
SHA1
33b50c3fb52424cd9bac6c448835ae7539868df6
-
SHA256
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805
-
SHA512
633cd76e6f595acec0c42a7b62ec94b2c602515fc79ed545e680ab5662eb55a7c387a6500cd7c687993a9a24b53514058acaa0089260d9fce326e64ca3a8c88c
-
SSDEEP
12288:xMr1y90zq/5ok7eA8l2ANSv3BkQom2qCkY69Rm1zdMv8Dj:cyYnNfQom2qCOmBbDj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1