General
-
Target
a96c0d1601f67225e9ebd55f1ff95ecf195c7793e4b3b8117108b805bcc4b730
-
Size
696KB
-
Sample
241105-wfzb9awfnj
-
MD5
f3d87d0bcf04572cc3fe4f0f369cd4f7
-
SHA1
91fe1c70acaffbc65b5c9b2c3adafc417729439e
-
SHA256
a96c0d1601f67225e9ebd55f1ff95ecf195c7793e4b3b8117108b805bcc4b730
-
SHA512
b944724c603bf9b469b07beb7e3e5a94ada61719c040f51c5a7c5a83eaed928278351a089e84050f3ed66f8087d2b5f1da14e714a97753b016bf8647bc793cb5
-
SSDEEP
12288:0MrZy90gLxECE/mdVq/4Khx6tfPvCnsr0m4Mlsgp/rOY/1F1DuDfQQUkQ:ly/qkAmlvCnsr0oBp/6Yg0
Static task
static1
Behavioral task
behavioral1
Sample
a96c0d1601f67225e9ebd55f1ff95ecf195c7793e4b3b8117108b805bcc4b730.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a96c0d1601f67225e9ebd55f1ff95ecf195c7793e4b3b8117108b805bcc4b730
-
Size
696KB
-
MD5
f3d87d0bcf04572cc3fe4f0f369cd4f7
-
SHA1
91fe1c70acaffbc65b5c9b2c3adafc417729439e
-
SHA256
a96c0d1601f67225e9ebd55f1ff95ecf195c7793e4b3b8117108b805bcc4b730
-
SHA512
b944724c603bf9b469b07beb7e3e5a94ada61719c040f51c5a7c5a83eaed928278351a089e84050f3ed66f8087d2b5f1da14e714a97753b016bf8647bc793cb5
-
SSDEEP
12288:0MrZy90gLxECE/mdVq/4Khx6tfPvCnsr0m4Mlsgp/rOY/1F1DuDfQQUkQ:ly/qkAmlvCnsr0oBp/6Yg0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1