General
-
Target
d5d01d34fdd330718bf45b0ff0f520ee0b52c7e51ccab949e8df370ba32dd80f
-
Size
658KB
-
Sample
241105-tletpatlcw
-
MD5
bce66db35a49bf31235eae488484b12f
-
SHA1
50f4155983edcdf30328edeea24b4d031df0d35b
-
SHA256
d5d01d34fdd330718bf45b0ff0f520ee0b52c7e51ccab949e8df370ba32dd80f
-
SHA512
42244b4688148c69517c59906059439eb0a5adea5e2c44a83b679198bf9de630ea61b93059e8ff727c628f86ede2c4cd4ba950bcc2d6dc34f59558337f0cab83
-
SSDEEP
12288:jMrSy90YEGe6Ftp7XCQvA84InHY4o1XX6KjLQoqBie/PpJgfHkMBYT:5y4Gj7SQxpHwTnQDr/BJKVu
Static task
static1
Behavioral task
behavioral1
Sample
d5d01d34fdd330718bf45b0ff0f520ee0b52c7e51ccab949e8df370ba32dd80f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d5d01d34fdd330718bf45b0ff0f520ee0b52c7e51ccab949e8df370ba32dd80f
-
Size
658KB
-
MD5
bce66db35a49bf31235eae488484b12f
-
SHA1
50f4155983edcdf30328edeea24b4d031df0d35b
-
SHA256
d5d01d34fdd330718bf45b0ff0f520ee0b52c7e51ccab949e8df370ba32dd80f
-
SHA512
42244b4688148c69517c59906059439eb0a5adea5e2c44a83b679198bf9de630ea61b93059e8ff727c628f86ede2c4cd4ba950bcc2d6dc34f59558337f0cab83
-
SSDEEP
12288:jMrSy90YEGe6Ftp7XCQvA84InHY4o1XX6KjLQoqBie/PpJgfHkMBYT:5y4Gj7SQxpHwTnQDr/BJKVu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1