General
-
Target
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92
-
Size
658KB
-
Sample
241106-jydr2svrhv
-
MD5
95fd1e5da6f4fa14fea0f19ecb276fcb
-
SHA1
1deb3b15b7ac28a3455e4a9ed2d06da5d56106f8
-
SHA256
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92
-
SHA512
cdc8bf564e90bb0bc018d8afbf04b35d58e6c85c6df481c52ddafd32ee24363d5621dbda68e4627cef96790f4a204a0b42c796e31734d535be55f965935e57e3
-
SSDEEP
12288:2Mrky90eaTTJ/SR3/ab8FYLu6fwN3YgouYd+a7sPAdw/p9:my3KQx/ab8F4TS3YgoH7sY2j
Static task
static1
Behavioral task
behavioral1
Sample
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92
-
Size
658KB
-
MD5
95fd1e5da6f4fa14fea0f19ecb276fcb
-
SHA1
1deb3b15b7ac28a3455e4a9ed2d06da5d56106f8
-
SHA256
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92
-
SHA512
cdc8bf564e90bb0bc018d8afbf04b35d58e6c85c6df481c52ddafd32ee24363d5621dbda68e4627cef96790f4a204a0b42c796e31734d535be55f965935e57e3
-
SSDEEP
12288:2Mrky90eaTTJ/SR3/ab8FYLu6fwN3YgouYd+a7sPAdw/p9:my3KQx/ab8F4TS3YgoH7sY2j
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1