General
-
Target
04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2
-
Size
531KB
-
Sample
241105-wg2h1awfpr
-
MD5
fd0ac29ff03b2e4f5c32b403d8b08460
-
SHA1
08f64639be6acbedac559b37192252a6c3ca0ab6
-
SHA256
04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2
-
SHA512
4e622c622ec28751f10761fbe8864f3462f2e0c60ea13de4ebf19b488d2fae5dea946670edee34209a59cbab01942ba686274a9cfdcb685dac4b1982685066de
-
SSDEEP
6144:Kly+bnr+Cp0yN90QEKDvaWzmdA4Zh07ieVwo9iotBeYuXQerug2DfdPgggY0tMTg:PMryy90GKVPUeYuXQO2OYub1m+
Static task
static1
Behavioral task
behavioral1
Sample
04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2
-
Size
531KB
-
MD5
fd0ac29ff03b2e4f5c32b403d8b08460
-
SHA1
08f64639be6acbedac559b37192252a6c3ca0ab6
-
SHA256
04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2
-
SHA512
4e622c622ec28751f10761fbe8864f3462f2e0c60ea13de4ebf19b488d2fae5dea946670edee34209a59cbab01942ba686274a9cfdcb685dac4b1982685066de
-
SSDEEP
6144:Kly+bnr+Cp0yN90QEKDvaWzmdA4Zh07ieVwo9iotBeYuXQerug2DfdPgggY0tMTg:PMryy90GKVPUeYuXQO2OYub1m+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1