General
-
Target
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029
-
Size
674KB
-
Sample
241105-v7e71sxrbr
-
MD5
e06fa233bc724d862e794dc764c69f56
-
SHA1
b792cd0b23e4ee6b18c6a471a4fd812c9a96aa45
-
SHA256
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029
-
SHA512
e0c547bd6890d7a97163c99d56111ac3a9f28bc782c213a20991229503da1b9823ee8aae41d1e497aa2af7d5edd2ae74f4bd4da88deae50b7d5752c63a423398
-
SSDEEP
12288:LMrpy90A2vZWnem6rcN50US60QzdekuW7RQTx63ScI:2y5I8nerUmOzdduoi4icI
Static task
static1
Behavioral task
behavioral1
Sample
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029
-
Size
674KB
-
MD5
e06fa233bc724d862e794dc764c69f56
-
SHA1
b792cd0b23e4ee6b18c6a471a4fd812c9a96aa45
-
SHA256
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029
-
SHA512
e0c547bd6890d7a97163c99d56111ac3a9f28bc782c213a20991229503da1b9823ee8aae41d1e497aa2af7d5edd2ae74f4bd4da88deae50b7d5752c63a423398
-
SSDEEP
12288:LMrpy90A2vZWnem6rcN50US60QzdekuW7RQTx63ScI:2y5I8nerUmOzdduoi4icI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1