General
-
Target
94d3dec76fe91eedbcab790973b6d6114940a56773f1f65ac4fc52442619d782
-
Size
674KB
-
Sample
241105-xaeakaxbmp
-
MD5
c27b4e147f0cee4f2871a4fc01826135
-
SHA1
089e93141d7591b9917adc84f73bc9332b3df610
-
SHA256
94d3dec76fe91eedbcab790973b6d6114940a56773f1f65ac4fc52442619d782
-
SHA512
d8f5b2c0c98eb7d7565a577f635b0571d9d413c351f6615382be62fa463f480ebf1e58ae8a86bb4769f83d124d987025035a7f8b74902537052df1c7dea8278e
-
SSDEEP
12288:4Mrwy90Se9KFIngx3wvB2brp5bUYqwMego/7XhbuWMER8Dgbbq:oyuKeuwvBW3RHM/o/7luP7ibq
Static task
static1
Behavioral task
behavioral1
Sample
94d3dec76fe91eedbcab790973b6d6114940a56773f1f65ac4fc52442619d782.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
94d3dec76fe91eedbcab790973b6d6114940a56773f1f65ac4fc52442619d782
-
Size
674KB
-
MD5
c27b4e147f0cee4f2871a4fc01826135
-
SHA1
089e93141d7591b9917adc84f73bc9332b3df610
-
SHA256
94d3dec76fe91eedbcab790973b6d6114940a56773f1f65ac4fc52442619d782
-
SHA512
d8f5b2c0c98eb7d7565a577f635b0571d9d413c351f6615382be62fa463f480ebf1e58ae8a86bb4769f83d124d987025035a7f8b74902537052df1c7dea8278e
-
SSDEEP
12288:4Mrwy90Se9KFIngx3wvB2brp5bUYqwMego/7XhbuWMER8Dgbbq:oyuKeuwvBW3RHM/o/7luP7ibq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1