General
-
Target
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb
-
Size
529KB
-
Sample
241105-y6fzpsxlgx
-
MD5
322383a9447a8ceb07fec4739003b0b7
-
SHA1
4f94ba9eab7b02dffd6b580f88d42552b25c146b
-
SHA256
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb
-
SHA512
c7a62c0fb0395ecda77fdd96556c4dc584dfc3494ec10ba6bcf3f46fa706de7c8d54be694be8b0b3c11282c66a0a271189529df0cc135df1cfd064b990eb40e5
-
SSDEEP
12288:aMrsy90m0JOras0+hvrhLQhV2+fHlpLcZkAOA:6ykJtwhv9kZrLcaAV
Static task
static1
Behavioral task
behavioral1
Sample
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb
-
Size
529KB
-
MD5
322383a9447a8ceb07fec4739003b0b7
-
SHA1
4f94ba9eab7b02dffd6b580f88d42552b25c146b
-
SHA256
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb
-
SHA512
c7a62c0fb0395ecda77fdd96556c4dc584dfc3494ec10ba6bcf3f46fa706de7c8d54be694be8b0b3c11282c66a0a271189529df0cc135df1cfd064b990eb40e5
-
SSDEEP
12288:aMrsy90m0JOras0+hvrhLQhV2+fHlpLcZkAOA:6ykJtwhv9kZrLcaAV
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1