General
-
Target
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427
-
Size
530KB
-
Sample
241105-zhhdasyfqr
-
MD5
aa6265ab3a4c6bbe4a7153f958913720
-
SHA1
95be1115daa9af2b35f95eec9060fd1e0faeb3f3
-
SHA256
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427
-
SHA512
05ba3afc1fe3e587fb8738138bc09cf9f96a3043b11eab8c8c58cf2d1e1c0feb4e3c7b3d834558ae8699fb60a15f34202f10dc999e8e9781e3ad33697fd27bbd
-
SSDEEP
12288:2Mrsy90f6fbmoxaYEqXKqDuoFBiD/yLn5r1gVttS:+yMC9xaYdXK0zw2Zs8
Static task
static1
Behavioral task
behavioral1
Sample
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427
-
Size
530KB
-
MD5
aa6265ab3a4c6bbe4a7153f958913720
-
SHA1
95be1115daa9af2b35f95eec9060fd1e0faeb3f3
-
SHA256
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427
-
SHA512
05ba3afc1fe3e587fb8738138bc09cf9f96a3043b11eab8c8c58cf2d1e1c0feb4e3c7b3d834558ae8699fb60a15f34202f10dc999e8e9781e3ad33697fd27bbd
-
SSDEEP
12288:2Mrsy90f6fbmoxaYEqXKqDuoFBiD/yLn5r1gVttS:+yMC9xaYdXK0zw2Zs8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1