General
-
Target
a144ff0450d438cd58da3175978c25c206e45662121bc9fb784fd48715885571
-
Size
529KB
-
Sample
241105-yzc98sycqm
-
MD5
11b606466edb7a17ea80e1d9e10fdc0e
-
SHA1
21005716fbcc212754402ccb4cfb5c3a45cb0df1
-
SHA256
a144ff0450d438cd58da3175978c25c206e45662121bc9fb784fd48715885571
-
SHA512
8484952d8e1c12a89039fe859c8710c73dd2dabde913ec91cc00745f93baf3cc9af91816c04b1686033f3ae0175d9f52fe27b72f0d22d74566ba06641042356f
-
SSDEEP
12288:TMrVy903xnsEkk1KJZfOEC4Iwhmn6tr4m:KyMxsXJYQ5wn6+m
Static task
static1
Behavioral task
behavioral1
Sample
a144ff0450d438cd58da3175978c25c206e45662121bc9fb784fd48715885571.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a144ff0450d438cd58da3175978c25c206e45662121bc9fb784fd48715885571
-
Size
529KB
-
MD5
11b606466edb7a17ea80e1d9e10fdc0e
-
SHA1
21005716fbcc212754402ccb4cfb5c3a45cb0df1
-
SHA256
a144ff0450d438cd58da3175978c25c206e45662121bc9fb784fd48715885571
-
SHA512
8484952d8e1c12a89039fe859c8710c73dd2dabde913ec91cc00745f93baf3cc9af91816c04b1686033f3ae0175d9f52fe27b72f0d22d74566ba06641042356f
-
SSDEEP
12288:TMrVy903xnsEkk1KJZfOEC4Iwhmn6tr4m:KyMxsXJYQ5wn6+m
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1