General
-
Target
39933a79f88363cf3a47d9471d73c5e933d393b0a87f07f1a47ce69371b8231d
-
Size
531KB
-
Sample
241105-sqdazstbqd
-
MD5
25ee1b0d2680c9c897370a3ed1123097
-
SHA1
72b1c479e439ee7448a71c9119e470e3fd008006
-
SHA256
39933a79f88363cf3a47d9471d73c5e933d393b0a87f07f1a47ce69371b8231d
-
SHA512
a79a730df9b3b7813c4441753d40726074b70cc3ed3e84fc89cf5e014c346ad18e7f8cd99bbe99b14dc105ddcbaedfb622447569f48e4d4b0a22f55b8232a396
-
SSDEEP
12288:cMray90M2bHSifAREscjfQGqB9RV4nWGKp:+yT2mMAerjQlBVpGs
Static task
static1
Behavioral task
behavioral1
Sample
39933a79f88363cf3a47d9471d73c5e933d393b0a87f07f1a47ce69371b8231d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
39933a79f88363cf3a47d9471d73c5e933d393b0a87f07f1a47ce69371b8231d
-
Size
531KB
-
MD5
25ee1b0d2680c9c897370a3ed1123097
-
SHA1
72b1c479e439ee7448a71c9119e470e3fd008006
-
SHA256
39933a79f88363cf3a47d9471d73c5e933d393b0a87f07f1a47ce69371b8231d
-
SHA512
a79a730df9b3b7813c4441753d40726074b70cc3ed3e84fc89cf5e014c346ad18e7f8cd99bbe99b14dc105ddcbaedfb622447569f48e4d4b0a22f55b8232a396
-
SSDEEP
12288:cMray90M2bHSifAREscjfQGqB9RV4nWGKp:+yT2mMAerjQlBVpGs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1