General
-
Target
5a19ea17383ab2bb647a32813873f776c4c896a911b8fc2369d6bc33b2395bb7
-
Size
673KB
-
Sample
241105-yqmgjsxdla
-
MD5
3b5ee180e8ff18d02b4fa912550bf753
-
SHA1
bc7e52496b68e0bd015bcb4f00f7c8afcdaa6908
-
SHA256
5a19ea17383ab2bb647a32813873f776c4c896a911b8fc2369d6bc33b2395bb7
-
SHA512
83a1af786a86091b8965f22b1136a74d6f8f6a54e74871d95c9b523b5522fb92fe5e0db543a3f16801989e5d50f159c2af9e9910d0ed22ea7fb6b325a78e8f3b
-
SSDEEP
12288:aMrey90VTarlSuhXCruU2MSFJaY+PI0vXMUEuWF1NoB5T:AyaTaBNhauU2GY+P7XM7um+t
Static task
static1
Behavioral task
behavioral1
Sample
5a19ea17383ab2bb647a32813873f776c4c896a911b8fc2369d6bc33b2395bb7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
5a19ea17383ab2bb647a32813873f776c4c896a911b8fc2369d6bc33b2395bb7
-
Size
673KB
-
MD5
3b5ee180e8ff18d02b4fa912550bf753
-
SHA1
bc7e52496b68e0bd015bcb4f00f7c8afcdaa6908
-
SHA256
5a19ea17383ab2bb647a32813873f776c4c896a911b8fc2369d6bc33b2395bb7
-
SHA512
83a1af786a86091b8965f22b1136a74d6f8f6a54e74871d95c9b523b5522fb92fe5e0db543a3f16801989e5d50f159c2af9e9910d0ed22ea7fb6b325a78e8f3b
-
SSDEEP
12288:aMrey90VTarlSuhXCruU2MSFJaY+PI0vXMUEuWF1NoB5T:AyaTaBNhauU2GY+P7XM7um+t
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1