General
-
Target
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43
-
Size
530KB
-
Sample
241105-zdasnayfjk
-
MD5
a8725d27bf7b59a1ec0735209ff41f4b
-
SHA1
0841c8aea28949a2a60d46efb125ac40b2965015
-
SHA256
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43
-
SHA512
ddc6ed6bea17856eafb14f247fe2a934524fcd97540066c7577525ef6d985b1e4a7a01c4f275ecf0ebbd131ae5c69b1c149988f44dda20b54719f437d13fd733
-
SSDEEP
12288:dMrky90n5a05+rd/0P9TpG111PV16jbfm:FygwR/0PdyvPV16jrm
Static task
static1
Behavioral task
behavioral1
Sample
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43
-
Size
530KB
-
MD5
a8725d27bf7b59a1ec0735209ff41f4b
-
SHA1
0841c8aea28949a2a60d46efb125ac40b2965015
-
SHA256
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43
-
SHA512
ddc6ed6bea17856eafb14f247fe2a934524fcd97540066c7577525ef6d985b1e4a7a01c4f275ecf0ebbd131ae5c69b1c149988f44dda20b54719f437d13fd733
-
SSDEEP
12288:dMrky90n5a05+rd/0P9TpG111PV16jbfm:FygwR/0PdyvPV16jrm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1