General
-
Target
d8c42a8c12adbe298bd3da2bbf2ef9df3acc637626d88de0af46f74d307a861c
-
Size
530KB
-
Sample
241105-z87e4szbnj
-
MD5
81f56c5a5476bd1b2a841e1a7c9ac81c
-
SHA1
2620937a56d060968a6426cc2009c220c47d1d64
-
SHA256
d8c42a8c12adbe298bd3da2bbf2ef9df3acc637626d88de0af46f74d307a861c
-
SHA512
5ecf2c22fe227d32fdc016d4eab61b577d148b8814232f6c08ca592bc59658198c5c5b9e927119d1ba5b05a806b0dba8144f65a196852bc769f295bf61b4f966
-
SSDEEP
12288:EMrMy90tNwFmSsB918l5KK5QKqBgepRi9Ohx:AyMO6BX8OAQZo9sx
Static task
static1
Behavioral task
behavioral1
Sample
d8c42a8c12adbe298bd3da2bbf2ef9df3acc637626d88de0af46f74d307a861c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d8c42a8c12adbe298bd3da2bbf2ef9df3acc637626d88de0af46f74d307a861c
-
Size
530KB
-
MD5
81f56c5a5476bd1b2a841e1a7c9ac81c
-
SHA1
2620937a56d060968a6426cc2009c220c47d1d64
-
SHA256
d8c42a8c12adbe298bd3da2bbf2ef9df3acc637626d88de0af46f74d307a861c
-
SHA512
5ecf2c22fe227d32fdc016d4eab61b577d148b8814232f6c08ca592bc59658198c5c5b9e927119d1ba5b05a806b0dba8144f65a196852bc769f295bf61b4f966
-
SSDEEP
12288:EMrMy90tNwFmSsB918l5KK5QKqBgepRi9Ohx:AyMO6BX8OAQZo9sx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1