General
-
Target
d876f1ab38b1852f83549f0531213d7d92e30da0ed4a492f815ac875ef9d4bd1
-
Size
530KB
-
Sample
241105-sltgeawlbm
-
MD5
27b3f9c15e2dd9f4ef0f45248bf97d03
-
SHA1
265cde184eba7a21bdf74cd95c293c644d9940eb
-
SHA256
d876f1ab38b1852f83549f0531213d7d92e30da0ed4a492f815ac875ef9d4bd1
-
SHA512
692b8ad0add197a09cf78f7abdd48b355b287cfa8fa83dae2ad749725ed5a463640f538eb9d82f05d4602f2b2ed3cf90d361c99dad92d733a9161c6a8b8e88f9
-
SSDEEP
12288:tMrWy90Dmq+rNo0AKFbayeE8qxhxYhsRPIS9:DymaO0dFBeE8gRRP1
Static task
static1
Behavioral task
behavioral1
Sample
d876f1ab38b1852f83549f0531213d7d92e30da0ed4a492f815ac875ef9d4bd1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d876f1ab38b1852f83549f0531213d7d92e30da0ed4a492f815ac875ef9d4bd1
-
Size
530KB
-
MD5
27b3f9c15e2dd9f4ef0f45248bf97d03
-
SHA1
265cde184eba7a21bdf74cd95c293c644d9940eb
-
SHA256
d876f1ab38b1852f83549f0531213d7d92e30da0ed4a492f815ac875ef9d4bd1
-
SHA512
692b8ad0add197a09cf78f7abdd48b355b287cfa8fa83dae2ad749725ed5a463640f538eb9d82f05d4602f2b2ed3cf90d361c99dad92d733a9161c6a8b8e88f9
-
SSDEEP
12288:tMrWy90Dmq+rNo0AKFbayeE8qxhxYhsRPIS9:DymaO0dFBeE8gRRP1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1