General
-
Target
306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3
-
Size
1002KB
-
Sample
241105-smxkfswldn
-
MD5
7b493b508e414d0f17d4875e171827df
-
SHA1
59e90fdd60340b0ed635d2128eded3778133f39a
-
SHA256
306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3
-
SHA512
39c2850cc95a498615141edbee9d5fda0d5173c7a87f9e275d006b3ea78c5200eb9478b90d3b4774ffbfa94c7229cb66aef075ef912ed4aca08716ca182eff88
-
SSDEEP
24576:zy6L02wBGllmdxrHkO8yvu/iO9BYE1n+PwoRtr8qPporjG4vm:GcllmdvY5Xe/YqPs
Static task
static1
Behavioral task
behavioral1
Sample
306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3
-
Size
1002KB
-
MD5
7b493b508e414d0f17d4875e171827df
-
SHA1
59e90fdd60340b0ed635d2128eded3778133f39a
-
SHA256
306288bc290cc8483380daa3b55aa9bb71c5ae9b855e9e9546e513cdaf1347b3
-
SHA512
39c2850cc95a498615141edbee9d5fda0d5173c7a87f9e275d006b3ea78c5200eb9478b90d3b4774ffbfa94c7229cb66aef075ef912ed4aca08716ca182eff88
-
SSDEEP
24576:zy6L02wBGllmdxrHkO8yvu/iO9BYE1n+PwoRtr8qPporjG4vm:GcllmdvY5Xe/YqPs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1