General
-
Target
2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d
-
Size
689KB
-
Sample
241105-ynad7syaqq
-
MD5
c8fc016ed51324476332b8b5982b0dcb
-
SHA1
c023752cdde847023eaa39e113b5a9379415b844
-
SHA256
2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d
-
SHA512
0f927d2bc06c3e213dcd3f9a61ad449e2ebc4d053506feea698b59400f7d6796d3113542641d402a616aaa8c737c7a367dd367abae5809c21272f059c819fea9
-
SSDEEP
12288:cMrEy903DoyDyJ5izMM6odX3N1jJMG+D224e/a4VhzfkvSFtmfighfDBUCJ:oyuDA92F3vR+D2Z4PfkutmagN7
Static task
static1
Behavioral task
behavioral1
Sample
2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d
-
Size
689KB
-
MD5
c8fc016ed51324476332b8b5982b0dcb
-
SHA1
c023752cdde847023eaa39e113b5a9379415b844
-
SHA256
2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d
-
SHA512
0f927d2bc06c3e213dcd3f9a61ad449e2ebc4d053506feea698b59400f7d6796d3113542641d402a616aaa8c737c7a367dd367abae5809c21272f059c819fea9
-
SSDEEP
12288:cMrEy903DoyDyJ5izMM6odX3N1jJMG+D224e/a4VhzfkvSFtmfighfDBUCJ:oyuDA92F3vR+D2Z4PfkutmagN7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1