General
-
Target
ed8a1798bab144f72cd67a44e199f89045510478f07f0641c26f693a83a3861c
-
Size
560KB
-
Sample
241105-znxp6syarg
-
MD5
9a81792b9960f1a0ebab7057fdf762ea
-
SHA1
2482f6e1d481020e22f7fabf94daf484e5cf3efe
-
SHA256
ed8a1798bab144f72cd67a44e199f89045510478f07f0641c26f693a83a3861c
-
SHA512
db45ea55e686e86e88230468f9d48189e617cdf6ab998cee4eeb70f66b87c3a3ab5ffb70736fd0319f30a260935894e8e0fe504f1a5b86e0e907fe5d7e478846
-
SSDEEP
12288:lMr4y90gL6YJ++UdtILL7/qjmbvzNWqn:FypZ++Ud2H7/7zEw
Static task
static1
Behavioral task
behavioral1
Sample
ed8a1798bab144f72cd67a44e199f89045510478f07f0641c26f693a83a3861c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
ed8a1798bab144f72cd67a44e199f89045510478f07f0641c26f693a83a3861c
-
Size
560KB
-
MD5
9a81792b9960f1a0ebab7057fdf762ea
-
SHA1
2482f6e1d481020e22f7fabf94daf484e5cf3efe
-
SHA256
ed8a1798bab144f72cd67a44e199f89045510478f07f0641c26f693a83a3861c
-
SHA512
db45ea55e686e86e88230468f9d48189e617cdf6ab998cee4eeb70f66b87c3a3ab5ffb70736fd0319f30a260935894e8e0fe504f1a5b86e0e907fe5d7e478846
-
SSDEEP
12288:lMr4y90gL6YJ++UdtILL7/qjmbvzNWqn:FypZ++Ud2H7/7zEw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1