General
-
Target
9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9
-
Size
988KB
-
Sample
241105-z9c8nayjdx
-
MD5
21b7870d0f106a67fc5786da0e4830e6
-
SHA1
1c25bf8a36277a21fd2c9d5458087d6b4d64e5a5
-
SHA256
9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9
-
SHA512
0db6cac158b187427ca09c8db0eac3990ca84d419aaf4b3abfe59703a4de518858d500ece7690d092c5c30245f1a7dfa0597f5ab341a59083c0c5157b847cb05
-
SSDEEP
24576:fytsW40n/twX95bWBWvzxapUKKlulXyZAEgPx1Xlhx:qtsI/6XvWuamKIugAEGx
Static task
static1
Behavioral task
behavioral1
Sample
9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9
-
Size
988KB
-
MD5
21b7870d0f106a67fc5786da0e4830e6
-
SHA1
1c25bf8a36277a21fd2c9d5458087d6b4d64e5a5
-
SHA256
9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9
-
SHA512
0db6cac158b187427ca09c8db0eac3990ca84d419aaf4b3abfe59703a4de518858d500ece7690d092c5c30245f1a7dfa0597f5ab341a59083c0c5157b847cb05
-
SSDEEP
24576:fytsW40n/twX95bWBWvzxapUKKlulXyZAEgPx1Xlhx:qtsI/6XvWuamKIugAEGx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1