General
-
Target
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939
-
Size
695KB
-
Sample
241105-w5aeesvqgs
-
MD5
834ae0339567c8e0bc57d356480e5ac5
-
SHA1
f3f0cb75291bd459f0edb6fe54c7aa461b53171f
-
SHA256
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939
-
SHA512
e3ebbf2155fdcc853d375afd661b5c338c2df8dd22f16dc0e35eb156e18dcbce2660e1f485873a0a829e702338f2660a9988931e6f09bb651ae8664faeecf2cf
-
SSDEEP
12288:/Mrqy90reOTNoYD/W7ULq/fDtU+AXumlJDQ4BJ/TfLZ0q8n8zmNjJepKwQ5Lf5xT:RyepNoYLW7UmxQXHlBQ43/F80mlg45DL
Static task
static1
Behavioral task
behavioral1
Sample
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939
-
Size
695KB
-
MD5
834ae0339567c8e0bc57d356480e5ac5
-
SHA1
f3f0cb75291bd459f0edb6fe54c7aa461b53171f
-
SHA256
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939
-
SHA512
e3ebbf2155fdcc853d375afd661b5c338c2df8dd22f16dc0e35eb156e18dcbce2660e1f485873a0a829e702338f2660a9988931e6f09bb651ae8664faeecf2cf
-
SSDEEP
12288:/Mrqy90reOTNoYD/W7ULq/fDtU+AXumlJDQ4BJ/TfLZ0q8n8zmNjJepKwQ5Lf5xT:RyepNoYLW7UmxQXHlBQ43/F80mlg45DL
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1