General
-
Target
f26ba321518e2a852d3ce5a57715c11d954ccc45a2a4ccb516441dfa594585f0
-
Size
536KB
-
Sample
241105-yy349sxemc
-
MD5
b72e5e6270a5c521a265e527c633f00b
-
SHA1
36d846afaa0800e1edc4f674d48c5aa2cdbe5f0f
-
SHA256
f26ba321518e2a852d3ce5a57715c11d954ccc45a2a4ccb516441dfa594585f0
-
SHA512
6451a3e9688019a096d184d63e2988d96adc9bbd24ea8925e3c300e1033fac081d0c10074c3a3a3873b036e5002e28ec29041ce820cf31fbedfa85a1de0e128e
-
SSDEEP
12288:zMr6y9019K8J+BCOUHsjRpZw73iuNhzVi3dv1m9uXVSJ:tys9mpUHOW7SuNh43F1m4QJ
Static task
static1
Behavioral task
behavioral1
Sample
f26ba321518e2a852d3ce5a57715c11d954ccc45a2a4ccb516441dfa594585f0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
f26ba321518e2a852d3ce5a57715c11d954ccc45a2a4ccb516441dfa594585f0
-
Size
536KB
-
MD5
b72e5e6270a5c521a265e527c633f00b
-
SHA1
36d846afaa0800e1edc4f674d48c5aa2cdbe5f0f
-
SHA256
f26ba321518e2a852d3ce5a57715c11d954ccc45a2a4ccb516441dfa594585f0
-
SHA512
6451a3e9688019a096d184d63e2988d96adc9bbd24ea8925e3c300e1033fac081d0c10074c3a3a3873b036e5002e28ec29041ce820cf31fbedfa85a1de0e128e
-
SSDEEP
12288:zMr6y9019K8J+BCOUHsjRpZw73iuNhzVi3dv1m9uXVSJ:tys9mpUHOW7SuNh43F1m4QJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1