General
-
Target
ad5865f8d67cbeb381e0449e65df8665a872f71b5974902874399ad92f9ad6cf
-
Size
660KB
-
Sample
241105-wlyb5svndt
-
MD5
7f4440ca18abc5b7d6ef9cd59ece2709
-
SHA1
a3dd20d139aecdfe40768d20cc27f6209dbaa028
-
SHA256
ad5865f8d67cbeb381e0449e65df8665a872f71b5974902874399ad92f9ad6cf
-
SHA512
c1ed37d8fbb40df982c2a5c33157ed09760e4c3aba8a0391364caefaf2ace890e8e76e18b49ad5102e0854706dd2693f7e40fee3fc921b377278ca804778923f
-
SSDEEP
12288:5Mrby90KVEqGXP7Q6yI+m6+OeCMfAj7vgFDlR1LOO3axP4nF/y:GyNaXP7pyOOhHvgF3p/y
Static task
static1
Behavioral task
behavioral1
Sample
ad5865f8d67cbeb381e0449e65df8665a872f71b5974902874399ad92f9ad6cf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ad5865f8d67cbeb381e0449e65df8665a872f71b5974902874399ad92f9ad6cf
-
Size
660KB
-
MD5
7f4440ca18abc5b7d6ef9cd59ece2709
-
SHA1
a3dd20d139aecdfe40768d20cc27f6209dbaa028
-
SHA256
ad5865f8d67cbeb381e0449e65df8665a872f71b5974902874399ad92f9ad6cf
-
SHA512
c1ed37d8fbb40df982c2a5c33157ed09760e4c3aba8a0391364caefaf2ace890e8e76e18b49ad5102e0854706dd2693f7e40fee3fc921b377278ca804778923f
-
SSDEEP
12288:5Mrby90KVEqGXP7Q6yI+m6+OeCMfAj7vgFDlR1LOO3axP4nF/y:GyNaXP7pyOOhHvgF3p/y
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1