General
-
Target
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad
-
Size
673KB
-
Sample
241105-tqcvwstlhz
-
MD5
817111ba05979ab9dd7ced975be4c9f8
-
SHA1
af8cd68310a8a01c009564723c3987a1f51d8e0c
-
SHA256
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad
-
SHA512
9ba1d18987064a4ab81181e9db2b63b85fc39d60c5f5af6ea03060ed63faae30047b6fe210c4cc3f90a213d7b5ca59209924c82744cf5fa3c587766197e163d6
-
SSDEEP
12288:LMrgy90Cj2Q6FCzgwJZoyxq8H74fWgJPyXiJ1A61GW/F8jB:7y76rFC57tzHY5JyqAup/2jB
Static task
static1
Behavioral task
behavioral1
Sample
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad
-
Size
673KB
-
MD5
817111ba05979ab9dd7ced975be4c9f8
-
SHA1
af8cd68310a8a01c009564723c3987a1f51d8e0c
-
SHA256
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad
-
SHA512
9ba1d18987064a4ab81181e9db2b63b85fc39d60c5f5af6ea03060ed63faae30047b6fe210c4cc3f90a213d7b5ca59209924c82744cf5fa3c587766197e163d6
-
SSDEEP
12288:LMrgy90Cj2Q6FCzgwJZoyxq8H74fWgJPyXiJ1A61GW/F8jB:7y76rFC57tzHY5JyqAup/2jB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1