General
-
Target
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0
-
Size
538KB
-
Sample
241105-t3a7tsxkem
-
MD5
e2769b4f09ddf6088b282750a5d50fcc
-
SHA1
c5f59455c706239415d07a652ae9f6929a340eb7
-
SHA256
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0
-
SHA512
ed3ee7bb5190299fa78c8b515ddf10254e4d31bf4ad1a1e8d25737b2ceec8e9430ab35d38dba7b48859b007f063bc447be652070e2e755872108c9958e6e5a0f
-
SSDEEP
12288:+Mray90AFEC/4BLmM1pBZ7ip6tGx16bgXsy:IyTaWWLmMSumAgt
Static task
static1
Behavioral task
behavioral1
Sample
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0
-
Size
538KB
-
MD5
e2769b4f09ddf6088b282750a5d50fcc
-
SHA1
c5f59455c706239415d07a652ae9f6929a340eb7
-
SHA256
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0
-
SHA512
ed3ee7bb5190299fa78c8b515ddf10254e4d31bf4ad1a1e8d25737b2ceec8e9430ab35d38dba7b48859b007f063bc447be652070e2e755872108c9958e6e5a0f
-
SSDEEP
12288:+Mray90AFEC/4BLmM1pBZ7ip6tGx16bgXsy:IyTaWWLmMSumAgt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1