General
-
Target
d46f160be20ef2c27b2f0f89ac080c81f5afe8b7676e2156c1cfc7ce222e7785
-
Size
537KB
-
Sample
241106-j8xmxaxcnp
-
MD5
89a6104c23b7e099494908721e6cd7c4
-
SHA1
9766e8149e70824db92db04a0ee9c9c12aed6246
-
SHA256
d46f160be20ef2c27b2f0f89ac080c81f5afe8b7676e2156c1cfc7ce222e7785
-
SHA512
2790aeaf24ba7b48c406f099039a265c9ef9b8e572ceb256396705987df7e65073546d9f6bda4f64ae42ca3c9154b1c0883518f2a0027f0c092be1653caad274
-
SSDEEP
12288:0Mrey90t5TFPbZeVSdOtpcOrZuDmTdAiKr5/3zvYrKA:yyALbUVDtmOqmT6h/3zvs
Static task
static1
Behavioral task
behavioral1
Sample
d46f160be20ef2c27b2f0f89ac080c81f5afe8b7676e2156c1cfc7ce222e7785.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
d46f160be20ef2c27b2f0f89ac080c81f5afe8b7676e2156c1cfc7ce222e7785
-
Size
537KB
-
MD5
89a6104c23b7e099494908721e6cd7c4
-
SHA1
9766e8149e70824db92db04a0ee9c9c12aed6246
-
SHA256
d46f160be20ef2c27b2f0f89ac080c81f5afe8b7676e2156c1cfc7ce222e7785
-
SHA512
2790aeaf24ba7b48c406f099039a265c9ef9b8e572ceb256396705987df7e65073546d9f6bda4f64ae42ca3c9154b1c0883518f2a0027f0c092be1653caad274
-
SSDEEP
12288:0Mrey90t5TFPbZeVSdOtpcOrZuDmTdAiKr5/3zvYrKA:yyALbUVDtmOqmT6h/3zvs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1