General
-
Target
715f234f261dd540f158bbefc76b9379764f917def4f505e53b144099a84712c
-
Size
673KB
-
Sample
241105-y1mv3azqck
-
MD5
615a45d3656edeba3443da53d1e60645
-
SHA1
3013f8ed9d2ea53e1c58ba31228f57b05512efbc
-
SHA256
715f234f261dd540f158bbefc76b9379764f917def4f505e53b144099a84712c
-
SHA512
05b799ce36ba6e4eb8d20f1546e90522ef4113624e50c50cde884db4c69cb7492433c13ce8e9dff859239c548ccc15417555edfc5273864ea400b38407ea3dd9
-
SSDEEP
12288:5MrHy90oLpoa8qhjdSmER2kuS1fEI6TdVeN39IIbuWIEgoy4QD3Sc1x:yydpb8qhjdSmEzu5fVkFuPGdcH
Static task
static1
Behavioral task
behavioral1
Sample
715f234f261dd540f158bbefc76b9379764f917def4f505e53b144099a84712c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
715f234f261dd540f158bbefc76b9379764f917def4f505e53b144099a84712c
-
Size
673KB
-
MD5
615a45d3656edeba3443da53d1e60645
-
SHA1
3013f8ed9d2ea53e1c58ba31228f57b05512efbc
-
SHA256
715f234f261dd540f158bbefc76b9379764f917def4f505e53b144099a84712c
-
SHA512
05b799ce36ba6e4eb8d20f1546e90522ef4113624e50c50cde884db4c69cb7492433c13ce8e9dff859239c548ccc15417555edfc5273864ea400b38407ea3dd9
-
SSDEEP
12288:5MrHy90oLpoa8qhjdSmER2kuS1fEI6TdVeN39IIbuWIEgoy4QD3Sc1x:yydpb8qhjdSmEzu5fVkFuPGdcH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1