General
-
Target
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
Size
522KB
-
Sample
241105-tsa43sthka
-
MD5
31a1ee1cab9bf1c1eb59e6037b82ac3c
-
SHA1
c2d425801ce4a579752db058f92d52284f6e7a9f
-
SHA256
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
SHA512
a970333c38f333268c480ad6f1897b776047fd958ee47c0de7f32a8a845d06ee4702032feafdcb85ae8fc5f08e4b1cef508fff9d93ffc64c0d37147c3985780f
-
SSDEEP
12288:1Mriy90lXc+tQNsTzKyvKib4vl6IAWPYv53mA:3yicYNKiMsI6h/
Static task
static1
Behavioral task
behavioral1
Sample
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
Size
522KB
-
MD5
31a1ee1cab9bf1c1eb59e6037b82ac3c
-
SHA1
c2d425801ce4a579752db058f92d52284f6e7a9f
-
SHA256
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
SHA512
a970333c38f333268c480ad6f1897b776047fd958ee47c0de7f32a8a845d06ee4702032feafdcb85ae8fc5f08e4b1cef508fff9d93ffc64c0d37147c3985780f
-
SSDEEP
12288:1Mriy90lXc+tQNsTzKyvKib4vl6IAWPYv53mA:3yicYNKiMsI6h/
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1