General
-
Target
b46800263ae86ea445357a48287cdd70e197bdd903300efe296b180ec19eb135
-
Size
673KB
-
Sample
241105-sgtavasnft
-
MD5
2620c8e1cacb14977574092c28d0be57
-
SHA1
8674889394dba36a3d54d2314ec356a5311904cf
-
SHA256
b46800263ae86ea445357a48287cdd70e197bdd903300efe296b180ec19eb135
-
SHA512
f944f0b1036a22d59e24aab4ed9d53779e23198eebae802639679281684be741bdcbc4ff109f94c9e1039dbca11a8d49fa6e9d67424a06f9f998de801df97e85
-
SSDEEP
12288:3MrOy90nH1sY7N+oUDf9+uSur2MyFKWy02muUxuWGiXVIrA8M5R/:5ytZDfMuSur2vMmuCu9prAP/
Static task
static1
Behavioral task
behavioral1
Sample
b46800263ae86ea445357a48287cdd70e197bdd903300efe296b180ec19eb135.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
b46800263ae86ea445357a48287cdd70e197bdd903300efe296b180ec19eb135
-
Size
673KB
-
MD5
2620c8e1cacb14977574092c28d0be57
-
SHA1
8674889394dba36a3d54d2314ec356a5311904cf
-
SHA256
b46800263ae86ea445357a48287cdd70e197bdd903300efe296b180ec19eb135
-
SHA512
f944f0b1036a22d59e24aab4ed9d53779e23198eebae802639679281684be741bdcbc4ff109f94c9e1039dbca11a8d49fa6e9d67424a06f9f998de801df97e85
-
SSDEEP
12288:3MrOy90nH1sY7N+oUDf9+uSur2MyFKWy02muUxuWGiXVIrA8M5R/:5ytZDfMuSur2vMmuCu9prAP/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1