General
-
Target
69204ae93aad47f9027501049f6285785314e5ebefea669cf872ee29cab2b36f
-
Size
659KB
-
Sample
241105-vvwn8sxpbq
-
MD5
ed90134db10494086a0dfbc490aaf8f0
-
SHA1
46117d7d36c42e5140badd09af1517409195ba99
-
SHA256
69204ae93aad47f9027501049f6285785314e5ebefea669cf872ee29cab2b36f
-
SHA512
5e2ae45ac9ecc5ed6e99e456f132b7846ac9e2fed196ac02185a564548f2576511af49ef966114556baf89a98b91c6f986c1f24050457cdef6c00b2b4256fbf7
-
SSDEEP
12288:uMruy90xR2qZa+Y62QYb2WfFrrfr615of5K0a/Fm8dVP3K+VXTFNO:kylqZan1H5r61+A/m8r3K+9FNO
Static task
static1
Behavioral task
behavioral1
Sample
69204ae93aad47f9027501049f6285785314e5ebefea669cf872ee29cab2b36f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
69204ae93aad47f9027501049f6285785314e5ebefea669cf872ee29cab2b36f
-
Size
659KB
-
MD5
ed90134db10494086a0dfbc490aaf8f0
-
SHA1
46117d7d36c42e5140badd09af1517409195ba99
-
SHA256
69204ae93aad47f9027501049f6285785314e5ebefea669cf872ee29cab2b36f
-
SHA512
5e2ae45ac9ecc5ed6e99e456f132b7846ac9e2fed196ac02185a564548f2576511af49ef966114556baf89a98b91c6f986c1f24050457cdef6c00b2b4256fbf7
-
SSDEEP
12288:uMruy90xR2qZa+Y62QYb2WfFrrfr615of5K0a/Fm8dVP3K+VXTFNO:kylqZan1H5r61+A/m8r3K+9FNO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1