General
-
Target
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c
-
Size
988KB
-
Sample
241105-twe77svfkj
-
MD5
88b43cbb705d6ff252035cd54e8f42d8
-
SHA1
8afd69d5d90eaf80488d929e059874c382040cdf
-
SHA256
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c
-
SHA512
2cfe5fcc7e69a6345e9f537bceae5aa2e05a7a36c32d6f0f4709f1d276544d8b11e5ac798f108a3d7df5807ffbcdacdbba2fa29989cd2974dc35356b660c9c3c
-
SSDEEP
12288:zMrOy90++cbS15kJdr8+r+yzTae+QUCpbzAmNw1tnK7fFXp3+ulOlqztcBbk40AW:ByRrwGgo+OT3YmNwXGfF5uulaqztcdi
Static task
static1
Behavioral task
behavioral1
Sample
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c
-
Size
988KB
-
MD5
88b43cbb705d6ff252035cd54e8f42d8
-
SHA1
8afd69d5d90eaf80488d929e059874c382040cdf
-
SHA256
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c
-
SHA512
2cfe5fcc7e69a6345e9f537bceae5aa2e05a7a36c32d6f0f4709f1d276544d8b11e5ac798f108a3d7df5807ffbcdacdbba2fa29989cd2974dc35356b660c9c3c
-
SSDEEP
12288:zMrOy90++cbS15kJdr8+r+yzTae+QUCpbzAmNw1tnK7fFXp3+ulOlqztcBbk40AW:ByRrwGgo+OT3YmNwXGfF5uulaqztcdi
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1