General
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
Size
695KB
-
Sample
241105-zhleysyfrk
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
Static task
static1
Behavioral task
behavioral1
Sample
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
Size
695KB
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1