General
-
Target
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826
-
Size
531KB
-
Sample
241105-zmzhda1lak
-
MD5
e9fd00e2e059898180f2b8b8d8817928
-
SHA1
a65e93655da32f704d0cdb2b1a4ead13d75fa45c
-
SHA256
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826
-
SHA512
2d2e2174a2f4492403eaa1e5448c0d7e05988ccebdcf17d8bf779a2a3917bfb3d11aae092a2a169dbb64d891385f67aad7013d9b374a6058969d8b947e2d74ab
-
SSDEEP
12288:OMrfy90zmDZorXZ88WqI3szU+f5KXa/PeiR3WwgDQx3:dyDqXZ88W73szLAEeioq3
Static task
static1
Behavioral task
behavioral1
Sample
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826
-
Size
531KB
-
MD5
e9fd00e2e059898180f2b8b8d8817928
-
SHA1
a65e93655da32f704d0cdb2b1a4ead13d75fa45c
-
SHA256
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826
-
SHA512
2d2e2174a2f4492403eaa1e5448c0d7e05988ccebdcf17d8bf779a2a3917bfb3d11aae092a2a169dbb64d891385f67aad7013d9b374a6058969d8b947e2d74ab
-
SSDEEP
12288:OMrfy90zmDZorXZ88WqI3szU+f5KXa/PeiR3WwgDQx3:dyDqXZ88W73szLAEeioq3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1