General
-
Target
3617ab7a925c8c89be352756ca49252e7a7b89ca1aabaa45baead3f127241c45
-
Size
522KB
-
Sample
241105-xg13xawkbt
-
MD5
927553a17093f72b9fc531bd3bb96fb6
-
SHA1
41f52ae91878015555f825b4c3c3e9677783c69a
-
SHA256
3617ab7a925c8c89be352756ca49252e7a7b89ca1aabaa45baead3f127241c45
-
SHA512
9a91f0fd8d5663bc69d670f632c5461d171e373df93e29ee8fb5d6cb09217f229a31e382706889c4984dd016f8b8a0c79c372f03ebf1d1126a086da2ee69c8c2
-
SSDEEP
12288:5MrHy90K9DwKM5I/Np0ceuItBUVpDf6u:GyHTM5I/t/ItBUVlf6u
Static task
static1
Behavioral task
behavioral1
Sample
3617ab7a925c8c89be352756ca49252e7a7b89ca1aabaa45baead3f127241c45.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
3617ab7a925c8c89be352756ca49252e7a7b89ca1aabaa45baead3f127241c45
-
Size
522KB
-
MD5
927553a17093f72b9fc531bd3bb96fb6
-
SHA1
41f52ae91878015555f825b4c3c3e9677783c69a
-
SHA256
3617ab7a925c8c89be352756ca49252e7a7b89ca1aabaa45baead3f127241c45
-
SHA512
9a91f0fd8d5663bc69d670f632c5461d171e373df93e29ee8fb5d6cb09217f229a31e382706889c4984dd016f8b8a0c79c372f03ebf1d1126a086da2ee69c8c2
-
SSDEEP
12288:5MrHy90K9DwKM5I/Np0ceuItBUVpDf6u:GyHTM5I/t/ItBUVlf6u
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1