General
-
Target
a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d
-
Size
522KB
-
Sample
241105-y8xp8sxmc1
-
MD5
813d1cc5ae4a59f3d19b41480910647e
-
SHA1
c26bcb4c7b4da6c4c1b84d45701112618d2cb0d9
-
SHA256
a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d
-
SHA512
c3c1d87319d7212239a5052ff7fae6dce767af4336018db7335912200cedf9fb57e4864e470f6ab4b94e26ab0dfcbec791dc44b4ff9ff09932081bd4ba0b2a6d
-
SSDEEP
12288:qMrYy90TwZBmfV+NDx6PkCD3gsD8lcoYxv7:ayE2Y+NDFe3DD0u
Static task
static1
Behavioral task
behavioral1
Sample
a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d
-
Size
522KB
-
MD5
813d1cc5ae4a59f3d19b41480910647e
-
SHA1
c26bcb4c7b4da6c4c1b84d45701112618d2cb0d9
-
SHA256
a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d
-
SHA512
c3c1d87319d7212239a5052ff7fae6dce767af4336018db7335912200cedf9fb57e4864e470f6ab4b94e26ab0dfcbec791dc44b4ff9ff09932081bd4ba0b2a6d
-
SSDEEP
12288:qMrYy90TwZBmfV+NDx6PkCD3gsD8lcoYxv7:ayE2Y+NDFe3DD0u
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1